National Library of Energy BETA

Sample records for unspecified flaw lets

  1. U-010:HP Onboard Administrator Unspecified Flaw Lets Remote Users...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    0:HP Onboard Administrator Unspecified Flaw Lets Remote Users Gain Access U-010:HP Onboard Administrator Unspecified Flaw Lets Remote Users Gain Access October 13, 2011 - 8:15am...

  2. V-218: HP Service Manager Unspecified Flaw Lets Remote Users...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    U-010:HP Onboard Administrator Unspecified Flaw Lets Remote Users Gain Access U-029: TCPIP Services for OpenVMS POPIMAP Service Bug Lets Remote Users Gain Unauthorized Access...

  3. U-048: HP LaserJet Printers Unspecified Flaw Lets Remote Users...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    T-699: EMC AutoStart Buffer Overflows Let Remote Users Execute Arbitrary Code U-049: IBM Tivoli Netcool Reporter CGI Bug Lets Remote Users Inject Commands on the Target System...

  4. U-257: Adobe ColdFusion Unspecified Bug Lets Remote Users Deny...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    7: Adobe ColdFusion Unspecified Bug Lets Remote Users Deny Service U-257: Adobe ColdFusion Unspecified Bug Lets Remote Users Deny Service September 12, 2012 - 6:00am Addthis...

  5. U-262: Microsoft Internet Explorer Flaw Lets Remote Users Execute...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    2: Microsoft Internet Explorer Flaw Lets Remote Users Execute Arbitrary Code U-262: Microsoft Internet Explorer Flaw Lets Remote Users Execute Arbitrary Code September 18, 2012 -...

  6. V-150: Apache VCL Input Validation Flaw Lets Remote Authenticated...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Apache VCL Input Validation Flaw Lets Remote Authenticated Users Gain Elevated Privileges V-150: Apache VCL Input Validation Flaw Lets Remote Authenticated Users Gain Elevated...

  7. T-663: Cisco Content Services Gateway ICMP Processing Flaw Lets...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    3: Cisco Content Services Gateway ICMP Processing Flaw Lets Remote Users Deny Service T-663: Cisco Content Services Gateway ICMP Processing Flaw Lets Remote Users Deny Service July...

  8. V-176: Adobe Flash Player Memory Corruption Flaw Lets Remote...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    6: Adobe Flash Player Memory Corruption Flaw Lets Remote Users Execute Arbitrary Code V-176: Adobe Flash Player Memory Corruption Flaw Lets Remote Users Execute Arbitrary Code June...

  9. T-574: Google Chrome Multiple Flaws Let Remote Users Execute...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    4: Google Chrome Multiple Flaws Let Remote Users Execute Arbitrary Code T-574: Google Chrome Multiple Flaws Let Remote Users Execute Arbitrary Code March 10, 2011 - 3:05pm Addthis...

  10. U-277: Google Chrome Multiple Flaws Let Remote Users Execute...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Addthis PROBLEM: Google Chrome Multiple Flaws Let Remote Users Execute Arbitrary Code PLATFORM: Version(s): prior to 22.0.1229.92 ABSTRACT: Several vulnerabilities were...

  11. U-242: Linux Kernel Netlink SCM_CREDENTIALS Processing Flaw Lets...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    2: Linux Kernel Netlink SCMCREDENTIALS Processing Flaw Lets Local Users Gain Elevated Privileges U-242: Linux Kernel Netlink SCMCREDENTIALS Processing Flaw Lets Local Users Gain...

  12. V-156: Linux Kernel Array Bounds Checking Flaw Lets Local Users...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    6: Linux Kernel Array Bounds Checking Flaw Lets Local Users Gain Elevated Privileges V-156: Linux Kernel Array Bounds Checking Flaw Lets Local Users Gain Elevated Privileges May...

  13. U-049: IBM Tivoli Netcool Reporter CGI Bug Lets Remote Users...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    LaserJet Printers Unspecified Flaw Lets Remote Users Update Firmware with Arbitrary Code U-053: Linux kexec Bugs Let Local and Remote Users Obtain Potentially Sensitive Information

  14. T-678: Red Hat Enterprise Virtualization Hypervisor VLAN Packet Processing Flaw Lets Remote Users Deny Service

    Office of Energy Efficiency and Renewable Energy (EERE)

    Red Hat Enterprise Virtualization Hypervisor VLAN Packet Processing Flaw Lets Remote Users Deny Service.

  15. V-095: Oracle Java Flaws Let Remote Users Execute Arbitrary Code...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    5: Oracle Java Flaws Let Remote Users Execute Arbitrary Code V-095: Oracle Java Flaws Let Remote Users Execute Arbitrary Code February 20, 2013 - 12:38am Addthis PROBLEM: Oracle...

  16. V-142: Oracle Java Reflection API Flaw Lets Remote Users Execute...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    2: Oracle Java Reflection API Flaw Lets Remote Users Execute Arbitrary Code V-142: Oracle Java Reflection API Flaw Lets Remote Users Execute Arbitrary Code April 25, 2013 - 12:14am...

  17. V-179: Blackberry Z10 Flaw Lets Physically Local Users Access...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    9: Blackberry Z10 Flaw Lets Physically Local Users Access the Device V-179: Blackberry Z10 Flaw Lets Physically Local Users Access the Device June 17, 2013 - 1:09am Addthis...

  18. U-107: Cisco NX-OS IP Packet Processing Flaw Lets Remote Users...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    07: Cisco NX-OS IP Packet Processing Flaw Lets Remote Users Deny Service U-107: Cisco NX-OS IP Packet Processing Flaw Lets Remote Users Deny Service February 21, 2012 - 6:00am ...

  19. T-536: Cisco ASA Multiple Flaws Let Remote Users Deny Service...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    6: Cisco ASA Multiple Flaws Let Remote Users Deny Service and Bypass Security Controls T-536: Cisco ASA Multiple Flaws Let Remote Users Deny Service and Bypass Security Controls ...

  20. V-020: Apple QuickTime Multiple Flaws Let Remote Users Execute...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    0: Apple QuickTime Multiple Flaws Let Remote Users Execute Arbitrary Code V-020: Apple QuickTime Multiple Flaws Let Remote Users Execute Arbitrary Code November 9, 2012 - 6:00am...

  1. V-225: McAfee Email Gateway SMTP Processing Flaw Lets Remote...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    5: McAfee Email Gateway SMTP Processing Flaw Lets Remote Users Deny Service V-225: McAfee Email Gateway SMTP Processing Flaw Lets Remote Users Deny Service August 23, 2013 - 1:26am...

  2. V-066: Adobe Acrobat/Reader Multiple Flaws Lets Remote Users...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    6: Adobe AcrobatReader Multiple Flaws Lets Remote Users Execute Arbitrary Code and Local Users Gain Elevated Privileges V-066: Adobe AcrobatReader Multiple Flaws Lets Remote...

  3. T-676: Apple iOS Certificate Chain Validation Flaw Lets Certain...

    Broader source: Energy.gov (indexed) [DOE]

    T-727:Microsoft Windows SSLTLS Protocol Flaw Lets Remote Users Decryption Sessions U-259: RSA BSAFE SSL-C Lets Remote Users Decrypt SSLTLS Traffic and SSL Buffer Overflow Lets ...

  4. T-673: Apple Safari Multiple Flaws Let Remote Users Execute Arbitrary Code, Conduct Cross-Site Scripting Attacks

    Broader source: Energy.gov [DOE]

    Apple Safari Multiple Flaws Let Remote Users Execute Arbitrary Code, Conduct Cross-Site Scripting Attacks

  5. T-536: Cisco ASA Multiple Flaws Let Remote Users Deny Service and Bypass

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Security Controls | Department of Energy 36: Cisco ASA Multiple Flaws Let Remote Users Deny Service and Bypass Security Controls T-536: Cisco ASA Multiple Flaws Let Remote Users Deny Service and Bypass Security Controls January 18, 2011 - 2:30pm Addthis PROBLEM: Cisco ASA Multiple Flaws Let Remote Users Deny Service and Bypass Security Controls. PLATFORM: Cisco 5500 Series Adaptive Security Appliances (ASA) ABSTRACT: Cisco ASA 5500 Series Adaptive Security Appliances are affected by multiple

  6. U-239: Apple iPhone SMS Processing Flaw Lets Remote Users Spoof...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    U-165: Apple iOS Bugs Let Remote Users Execute Arbitrary Code and Spoof Address Bar URLs T-676: Apple iOS Certificate Chain Validation Flaw Lets Certain Remote Users Access or ...

  7. T-541: Citrix Provisioning Services Unspecified Flaw Let's Remote Users Execute Arbitrary Code

    Broader source: Energy.gov [DOE]

    A vulnerability has been identified in Citrix Provisioning Services that could result in arbitrary code execution. This vulnerability can be triggered by an attacker sending a specially crafted packet to the Provisioning Services server. This vulnerability is present in all supported versions of Citrix Provisioning Services up to and including version 5.6.

  8. U-161: Citrix Provisioning Services Unspecified Flaw Lets Remote Users Execute Arbitrary Code

    Broader source: Energy.gov [DOE]

    A vulnerability was reported in Citrix Provisioning Services. A remote user can execute arbitrary code on the target system.

  9. U-140: HP-UX Unspecified Flaw in DCE Lets Remote Users Execute Arbitrary Code

    Broader source: Energy.gov [DOE]

    A remote user can execute arbitrary code on the target system. A remote user can send specially crafted data to execute arbitrary code on the target system. The code will run with the privileges of the target service.

  10. V-218: HP Service Manager Unspecified Flaw Lets Remote Users Gain Unauthorized Access

    Broader source: Energy.gov [DOE]

    This security update resolves a vulnerability in the HP Service Manager which allows people to have access to unauthorized information

  11. V-049: RealPlayer Buffer Overflow and Invalid Pointer Flaw Let Remote Users

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Execute Arbitrary Code | Department of Energy 9: RealPlayer Buffer Overflow and Invalid Pointer Flaw Let Remote Users Execute Arbitrary Code V-049: RealPlayer Buffer Overflow and Invalid Pointer Flaw Let Remote Users Execute Arbitrary Code December 18, 2012 - 1:30am Addthis PROBLEM: RealPlayer Buffer Overflow and Invalid Pointer Flaw Let Remote Users Execute Arbitrary Code PLATFORM: Windows RealPlayer 15.0.6.14 and prior. ABSTRACT: Two vulnerabilities were reported in RealPlayer. REFERENCE

  12. V-165: Cisco WebEx for iOS Certificate Validation Flaw Lets Remote Users

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Spoof the Server | Department of Energy 65: Cisco WebEx for iOS Certificate Validation Flaw Lets Remote Users Spoof the Server V-165: Cisco WebEx for iOS Certificate Validation Flaw Lets Remote Users Spoof the Server May 28, 2013 - 12:46am Addthis PROBLEM: Cisco WebEx for iOS Certificate Validation Flaw Lets Remote Users Spoof the Server PLATFORM: Cisco WebEx for iOS 4.1, Other versions may also be affected. ABSTRACT: A vulnerability was reported in Cisco WebEx for iOS. REFERENCE LINKS:

  13. T-727:Microsoft Windows SSL/TLS Protocol Flaw Lets Remote Users Decryption

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Sessions | Department of Energy 7:Microsoft Windows SSL/TLS Protocol Flaw Lets Remote Users Decryption Sessions T-727:Microsoft Windows SSL/TLS Protocol Flaw Lets Remote Users Decryption Sessions September 27, 2011 - 8:00am Addthis PROBLEM: Microsoft Windows SSL/TLS Protocol Flaw Lets Remote Users Decryption Sessions. PLATFORM: Windows XP Service Pack 3 Windows XP Professional x64 Edition Service Pack 2 Windows Server 2003 Service Pack 2 Windows Server 2003 x64 Edition Service Pack 2 Windows

  14. U-239: Apple iPhone SMS Processing Flaw Lets Remote Users Spoof SMS Source

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Addresses | Department of Energy 39: Apple iPhone SMS Processing Flaw Lets Remote Users Spoof SMS Source Addresses U-239: Apple iPhone SMS Processing Flaw Lets Remote Users Spoof SMS Source Addresses August 20, 2012 - 7:00am Addthis PROBLEM: Apple iPhone SMS Processing Flaw Lets Remote Users Spoof SMS Source Addresses PLATFORM: Version(s): 6 beta 4 and prior versions ABSTRACT: A remote user can spoof SMS source addresses. Reference LINKS: SecurityTracker Alert ID: 1027410 Apple.com PCMag.com

  15. V-049: RealPlayer Buffer Overflow and Invalid Pointer Flaw Let...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    V-049: RealPlayer Buffer Overflow and Invalid Pointer Flaw Let Remote Users Execute ... The vendor has issued a fix (16.0.0.282). Addthis Related Articles V-228: RealPlayer ...

  16. U-089:Apache Struts ParameterInterceptor() Flaw Lets Remote Users...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Apache Struts ParameterInterceptor() Flaw Lets Remote Users Execute Arbitrary Commands PLATFORM: Struts 2.0.0 - Struts 2.3.1.1 ABSTRACT: A remote user can execute arbitrary code...

  17. T-676: Apple iOS Certificate Chain Validation Flaw Lets Certain Remote

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Users Access or Modify SSL/TLS Sessions | Department of Energy 76: Apple iOS Certificate Chain Validation Flaw Lets Certain Remote Users Access or Modify SSL/TLS Sessions T-676: Apple iOS Certificate Chain Validation Flaw Lets Certain Remote Users Access or Modify SSL/TLS Sessions July 26, 2011 - 1:06am Addthis PROBLEM: A vulnerability was reported in Apple iOS. A remote user with the ability to conduct a man-in-the-middle attack can access or modify SSL/TLS sessions. PLATFORM: iOS 4.2.5

  18. U-107: Cisco NX-OS IP Packet Processing Flaw Lets Remote Users Deny Service

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    | Department of Energy 07: Cisco NX-OS IP Packet Processing Flaw Lets Remote Users Deny Service U-107: Cisco NX-OS IP Packet Processing Flaw Lets Remote Users Deny Service February 21, 2012 - 6:00am Addthis PROBLEM: A vulnerability was reported in Cisco NX-OS. A remote user can cause denial of service conditions. PLATFORM: Nexus 1000v, 5000, and 7000 Series Switches ABSTRACT: A remote user can send a specially crafted IP packet to cause the target device to reload. reference LINKS: Cisco

  19. V-164: Apple QuickTime Multiple Flaws Let Remote Users Execute...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    1) An unspecified error when handling TeXML files can be exploited to cause memory corruption. 2) A boundary error when handling H.263 encoded movie files can be exploited to...

  20. U-111: IBM AIX ICMP Processing Flaw Lets Remote Users Deny Service...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    aixefixessecurityicmpfix.tar Addthis Related Articles U-096: IBM AIX TCP Large Send Offload Bug Lets Remote Users Deny Service V-031: IBM WebSphere DataPower...

  1. T-727:Microsoft Windows SSL/TLS Protocol Flaw Lets Remote Users...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    U-033: Microsoft Security Bulletin Summary for November 2011 T-706: Microsoft Fraudulent Digital Certificate Issued by DigiNotar U-259: RSA BSAFE SSL-C Lets Remote Users Decrypt ...

  2. U-247: EMC Cloud Tiering Appliance Flaw Lets Remote Users Bypass...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    CTA 7.3.1 and later with Hotfix ESA-2012-034 Addthis Related Articles V-045: Adobe ColdFusion Lets Local Users Bypass Sandbox Restrictions V-036: EMC Smarts Network...

  3. U-106: Citrix XenServer Multiple Flaws in Web Self Service Have...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    6: Citrix XenServer Multiple Flaws in Web Self Service Have Unspecified Impact U-106: Citrix XenServer Multiple Flaws in Web Self Service Have Unspecified Impact February 17, 2012...

  4. U-137: HP Performance Manager Unspecified Bug Lets Remote Users...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    vulnerability has been identified with HP Performance Manager running on HP-UX, Linux, Solaris, and Windows. The vulnerability could be exploited remotely to execute...

  5. V-093: Symantec PGP Desktop Buffer Overflows Let Local Users...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Secure Mobility Client Heap Overflow Lets Local Users Gain Elevated Privileges V-066: Adobe AcrobatReader Multiple Flaws Lets Remote Users Execute Arbitrary Code and Local Users...

  6. V-227: VMware Workstation and Player vmware-mount Command Flaw...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Workstation and Player vmware-mount Command Flaw Lets Local Users Gain Root Privileges V-227: VMware Workstation and Player vmware-mount Command Flaw Lets Local Users Gain Root...

  7. T-681:IBM Lotus Symphony Multiple Unspecified Vulnerabilities

    Broader source: Energy.gov [DOE]

    Multiple unspecified vulnerabilities in IBM Lotus Symphony 3 before FP3 have unknown impact and attack vectors, related to "critical security vulnerability issues."

  8. V-139: Cisco Network Admission Control Input Validation Flaw...

    Broader source: Energy.gov (indexed) [DOE]

    PROBLEM: Cisco Network Admission Control Input Validation Flaw Lets Remote Users Inject SQL Commands PLATFORM: Cisco NAC Manager versions prior to 4.8.3.1 and 4.9.2 ABSTRACT: A...

  9. T-696: RSA Adaptive Authentication Has Unspecified Remote Authenticated Session Re-use Flaw

    Broader source: Energy.gov [DOE]

    An issue with Adaptive Authentication (On-Premise) was discovered which in certain circumstances might affect the out-of-the-box available authentication methods. In certain circumstances, when authentication information is compromised, and with the knowledge of additional session information, the authentication information might be reused within an active session.

  10. U-106: Citrix XenServer Multiple Flaws in Web Self Service Have Unspecified Impact

    Broader source: Energy.gov [DOE]

    A number of security vulnerabilities have been identified in the management web interface of Citrix XenServer Web Self Service.

  11. Flawed reasoning

    SciTech Connect (OSTI)

    Frankena, M.W.; Owen, B.M.

    1993-07-15

    The FERC's failure to investigate the Entergy/GSU merger's effects on market power may force other agencies to examine electric utility mergers on their own. The competitive effects of the proposed merger Entergy and Gulf States Utilities (GSU) will not be further investigated by the Federal Energy Regulatory Commission (FERC), according to a January 1993 order. The FERC's primary justification is that the [open quotes]open access[close quotes] transmission conditions offered by the merging parties eliminated concern over market power in transmission and bulk power. The FERC's reasoning is flawed. If the merger were to lead to an increase in market power, the proposed transmission conditions would not prevent the merged firm from exercising that power. The FERC also justifies its decision not to investigate the competitive effects of the merger on the grounds that no intervenor had demonstrated that present competition between the two systems is more than de minimis. This is not an appropriate standard. Intervenors demonstrated that Entergy's and GSU's transmission system offer alternative contract routes for bulk power between generators and customers. Even if Entergy and GSU both do not actually sell significant amounts of the same transmission-service, an antitrust evaluation should consider whether the availability of a second, independent route constrains the pricing of the first. The FERC's reasoning indicates that it has lost its way in carrying out its responsibilities to protect consumers. Open access to transmission systems may play an important role in increasing competition in bulk power markets. However, the FERC's goal should be to promote competition, not merely to open access for its own sake. In its enthusiasm to secure [open quotes]open access[close quotes], the FERC appears willing to ignore possible reductions in competition.

  12. T-593: Microsoft Internet Explorer unspecified code execution

    Broader source: Energy.gov [DOE]

    Unspecified vulnerability in Microsoft Internet Explorer 8 on Windows 7 allows remote attackers to bypass Protected Mode and create arbitrary files by leveraging access to a Low integrity process.

  13. Flaw detection and evaluation

    DOE Patents [OSTI]

    Wilks, Robert S.; Sturges, Jr., Robert H.

    1983-01-01

    The invention provides a method of and apparatus for optically inspecting nuclear fuel pellets for surface flaws. The inspection system includes a prism and lens arrangement for scanning the surface of each pellet as the same is rotated. The resulting scan produces data indicative of the extent and shape of each flaw which is employed to generate a flaw quality index for each detected flaw. The flaw quality indexes from all flaws are summed and compared with an acceptable surface quality index. The result of the comparison is utilized to control the acceptance or rejection of the pellet.

  14. T-622: Adobe Acrobat and Reader Unspecified Memory Corruption Vulnerability

    Broader source: Energy.gov [DOE]

    The vulnerability is due to an unspecified error in the affected software when it processes .pdf files. An unauthenticated, remote attacker could exploit this vulnerability by convincing a user to view a malicious .pdf file. When viewed, the file could trigger a memory corruption error that could allow the attacker to execute arbitrary code on the system with the privileges of the user.

  15. U-233: Oracle Database INDEXTYPE CTXSYS.CONTEXT Bug Lets Remote...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Articles U-083:Oracle Critical Patch Update Advisory - January 2012 V-067: Oracle Java Flaw Lets Remote Users Execute Arbitrary Code T-576: Oracle Solaris Adobe Flash Player...

  16. U-119: Blackberry PlayBook Unspecified WebKit Bug Lets Remote...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    7.1, and BlackBerry PlayBook tablet software ABSTRACT: A remote user can create HTML that, when loaded by the target user, will execute arbitrary code on the target user's...

  17. T-636: Wireshark Multiple Flaws Let Remote Users Deny Service

    Broader source: Energy.gov [DOE]

    Multiple vulnerabilities were reported in Wireshark. A remote user can cause denial of service conditions.

  18. U-014: Oracle Java Runtime Environment (JRE) Multiple Flaws Let...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    SDK and JRE 1.4.233 and prior ABSTRACT: A remote user can create a Java applet or Java Web Start application that, when loaded by the target user, will access or modify data or...

  19. U-119: Blackberry PlayBook Unspecified WebKit Bug Lets Remote Users Execute Arbitrary Code

    Broader source: Energy.gov [DOE]

    A remote user can create HTML that, when loaded by the target user, will execute arbitrary code on the target user's system

  20. U-138: Cisco IOS IPSec IKE Unspecified Denial of Service Vulnerability |

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Department of Energy 38: Cisco IOS IPSec IKE Unspecified Denial of Service Vulnerability U-138: Cisco IOS IPSec IKE Unspecified Denial of Service Vulnerability April 2, 2012 - 7:00am Addthis PROBLEM: A vulnerability has been reported in Cisco IOS, which can be exploited by malicious people to cause a DoS (Denial of Service). PLATFORM: Cisco IOS XE 2.1.x Cisco IOS XE 2.2.x Cisco IOS XE 2.3.x Cisco IOS XE 2.4.x Cisco IOS XE 2.5.x Cisco IOS XE 2.6.x Cisco IOS XE 3.1.x Cisco IOS XE 3.3.x

  1. The HMDS Coating Flaw Removal Tool

    SciTech Connect (OSTI)

    Monticelli, M V; Nostrand, M C; Mehta, N; Kegelmeyer, L; Johnson, M A; Fair, J; Widmayer, C

    2008-10-24

    In many high energy laser systems, optics with HMDS sol gel antireflective coatings are placed in close proximity to each other making them particularly susceptible to certain types of strong optical interactions. During the coating process, halo shaped coating flaws develop around surface digs and particles. Depending on the shape and size of the flaw, the extent of laser light intensity modulation and consequent probability of damaging downstream optics may increase significantly. To prevent these defects from causing damage, a coating flaw removal tool was developed that deploys a spot of decane with a syringe and dissolves away the coating flaw. The residual liquid is evacuated leaving an uncoated circular spot approximately 1mm in diameter. The resulting uncoated region causes little light intensity modulation and thus has a low probability of causing damage in optics downstream from the mitigated flaw site.

  2. V-153: Symantec Brightmail Gateway Input Validation Flaw Permits...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    3: Symantec Brightmail Gateway Input Validation Flaw Permits Cross-Site Scripting Attacks V-153: Symantec Brightmail Gateway Input Validation Flaw Permits Cross-Site Scripting...

  3. U-252: Barracuda Web Filter Input Validation Flaws Permit Cross...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    2: Barracuda Web Filter Input Validation Flaws Permit Cross-Site Scripting Attacks U-252: Barracuda Web Filter Input Validation Flaws Permit Cross-Site Scripting Attacks September...

  4. ULTRASONIC FLAW DETECTION METHOD AND MEANS

    DOE Patents [OSTI]

    Worlton, D.C.

    1961-08-15

    A method of detecting subsurface flaws in an object using ultrasonic waves is described. An ultnasonic wave of predetermined velocity and frequency is transmitted to engage the surface of the object at a predetermined angle of inci dence thereto. The incident angle of the wave to the surface is determined with respect to phase velocity, incident wave velocity, incident wave frequency, and the estimated depth of the flaw so that Lamb waves of a particular type and mode are induced only in the portion of the object between the flaw and the surface. These Lamb waves are then detected as they leave the object at an angle of exit equal to the angle of incidence. No waves wlll be generated in the object and hence received if no flaw exists beneath the surface. (AEC)

  5. NON-DESTRUCTIVE FLAW DETECTION APPARATUS

    DOE Patents [OSTI]

    Stateman, M.J.; Holloway, H.R.

    1957-12-17

    An apparatus is described for the non-destructive detection of flaws in electrical conducting articles. The particular feature of the detection apparatus is that a flaw in the front or back of the test article will not be masked by signals caused by the passage of the end and front of the article through the detection apparatus. The present invention alleviates the above problem by mounting detection coils on directly opposite sides of the test passageway so that the axes of the pickup coils are perpendicular to the axis of an energizing coil through which the article is passed. A flaw in the article will cause a change in the voltage induced in one pickup coil, but passage of the end or front of the article will not produce unequal signals. The signals are compared in appropriate electrical circuitry to actuate a recorder only when unequal signals are present, indicating the presence of a flaw.

  6. Midland reactor pressure vessel flaw distribution

    SciTech Connect (OSTI)

    Foulds, J.R.; Kennedy, E.L.; Rosinski, S.T.

    1993-12-01

    The results of laboratory nondestructive examination (NDE), and destructive cross-sectioning of selected weldment sections of the Midland reactor pressure vessel were analyzed per a previously developed methodology in order to develop a flaw distribution. The flaw distributions developed from the NDE results obtained by two different ultrasonic test (UT) inspections (Electric Power Research Institute NDE Center and Pacific Northwest Laboratories) were not statistically significantly different. However, the distribution developed from the NDE Center`s (destructive) cross-sectioning-based data was found to be significantly different than those obtained through the UT inspections. A fracture mechanics-based comparison of the flaw distributions showed that the cross-sectioning-based data, conservatively interpreted (all defects considered as flaws), gave a significantly lower vessel failure probability when compared with the failure probability values obtained using the UT-based distributions. Given that the cross-sectioning data were reportedly biased toward larger, more significant-appearing (by UT) indications, it is concluded that the nondestructive examinations produced definitively conservative results. In addition to the Midland vessel inspection-related analyses, a set of twenty-seven numerical simulations, designed to provide a preliminary quantitative assessment of the accuracy of the flaw distribution method used here, were conducted. The calculations showed that, in more than half the cases, the analysis produced reasonably accurate predictions.

  7. Flaw Tolerance for Multiple Fatique Cracks

    SciTech Connect (OSTI)

    Gosselin, Stephen R.; Simonen, Fredric A.; Carter, R. G.

    2005-07-01

    This paper documents important details of the technical bases for changes to Appendix L. Calculations identified aspect ratios for equivalent single cracks (ESC) between the extremes of a 6:1 ratio and a full circumferential crack that can be used in Appendix L flaw tolerance assessments to account for the initiation, growth, and linking of multiple fatigue cracks. Probabilistic fracture mechanics (PFM) calculations determined ESC aspect ratios that result in the same through-wall crack probability as multiple small cracks (0.02 inch depth) that initiate and coalesce. The computations considered two materials (stainless and low alloy steels), three pipe diameters, five cyclic membrane-to-gradient stress ratios and a wide range of primary loads. Subsequent deterministic calculations identified the ESC aspect ratio for the hypothetical reference flaw depth assumptions in Appendix L. This paper also describes computations that compare the Appendix L flaw tolerance allowable operating period for the ESC models with results obtained when the a single default 6:1 aspect ratio reference flaw.

  8. T-574: Google Chrome Multiple Flaws Let Remote Users Execute Arbitrary Code

    Broader source: Energy.gov [DOE]

    Multiple vulnerabilities have been reported in Google Chrome, where some have an unknown impact while others can be exploited by malicious people bypass certain security restrictions, disclose system information, and compromise a user's system.

  9. U-170: Apple QuickTime Multiple Flaws Let Remote Users Execute Arbitrary Code

    Broader source: Energy.gov [DOE]

    Multiple vulnerabilities were reported in Apple QuickTime. A remote user can cause arbitrary code to be executed on the target user's system.

  10. V-006: CA ARCserve Backup Flaws Let Remote Users Execute Arbitrary Code and Deny Service

    Broader source: Energy.gov [DOE]

    Two vulnerabilities were reported in CA ARCserve Backup. A remote user can execute arbitrary code on the target system. A remote user can cause denial of service conditions.

  11. U-134: Apache Traffic Server Host Header Processing Flaw Lets Remote Users Deny Service

    Broader source: Energy.gov [DOE]

    A vulnerability was reported in Apache Traffic Server. A remote user can cause denial of service conditions.

  12. U-170: Apple QuickTime Multiple Flaws Let Remote Users Execute...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    overflow CVE-2012-0670. A specially crafted '.pict' file can trigger a memory corruption error CVE-2012-0671. Impact: A remote user can create a file that, when loaded by...

  13. T-673: Apple Safari Multiple Flaws Let Remote Users Execute Arbitrary...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    specially crafted HTML that, when loaded by the target user, will trigger a memory corruption error and execute arbitrary code on the target system - CVE-2010-1823,...

  14. T-662: ISC BIND Packet Processing Flaw Lets Remote Users Deny Service

    Broader source: Energy.gov [DOE]

    A defect in the affected BIND 9 versions allows an attacker to remotely cause the "named" process to exit using a specially crafted packet. This defect affects both recursive and authoritative servers. The code location of the defect makes it impossible to protect BIND using ACLs configured within named.conf or by disabling any features at compile-time or run-time. A remote attacker would need to be able to send a specially crafted packet directly to a server running a vulnerable version of BIND. There is also the potential for an indirect attack via malware that is inadvertently installed and run, where infected machines have direct access to an organization's nameservers.

  15. T-617: BIND RPZ Processing Flaw Lets Remote Users Deny Service

    Broader source: Energy.gov [DOE]

    When a name server is configured with a response policy zone (RPZ), queries for type RRSIG can trigger a server crash.

  16. U-227: bind-dyndb-ldap DN Escaping Flaw Lets Remote Users Deny Service

    Broader source: Energy.gov [DOE]

    A vulnerability has been reported in bind-dyndb-ldap, which can be exploited by malicious people to cause a DoS (Denial of Service).

  17. V-165: Cisco WebEx for iOS Certificate Validation Flaw Lets Remote...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    The security issue is caused due to the application not properly verifying the server SSL certificate. This can be exploited to e.g. spoof the server via a MitM (Man-in-the-Middle) ...

  18. U-133: Google Chrome Multiple Flaws Let Remote Users Execute Arbitrary Code

    Broader source: Energy.gov [DOE]

    Multiple vulnerabilities were reported in Google Chrome. A remote user can cause arbitrary code to be executed on the target user's system.

  19. U-143: Google Chrome Multiple Flaws Let Remote Users Execute Arbitrary Code

    Broader source: Energy.gov [DOE]

    Multiple vulnerabilities were reported in Google Chrome. A remote user can cause arbitrary code to be executed on the target user's system.

  20. T-663: Cisco Content Services Gateway ICMP Processing Flaw Lets Remote Users Deny Service

    Broader source: Energy.gov [DOE]

    The Cisco Content Services Gateway: Second Generation provides intelligent network capabilities such as flexible policy management and billing based on deep-packet inspection, as well as subscriber and application awareness capabilities that enable mobile operators to quickly and easily offer value-added, differentiated services over their mobile data networks. A DoS vulnerability exists in the Cisco Content Services Gateway: Second Generation could allow an unauthenticated attacker to cause a device reload by sending crafted ICMP messages to the affected device. Note: The Cisco Gateway GPRS Support Node (GGSN), the Cisco Mobile Wireless Home Agent (HA), the Cisco Wireless Security Gateway (WSG), the Cisco Broadband Wireless Gateway and Cisco IP Transfer Point (ITP), and the Cisco Long Term Evolution (LTE) Gateway are not affected. This vulnerability is documented in Cisco bug ID CSCtl79577 ( registered customers only) and has been assigned CVE ID CVE-2011-2064.

  1. U-205: RSA Access Manager Session Replay Flaw Lets Remote Users Access the System

    Broader source: Energy.gov [DOE]

    A vulnerability was reported in RSA Access Manager. A remote user can gain access to the target system.

  2. U-166: Adobe Shockwave Player Memory Corruption Flaws Let Remote Users Execute Arbitrary Code

    Broader source: Energy.gov [DOE]

    Multiple vulnerabilities were reported in Adobe Shockwave Player. A remote user can cause arbitrary code to be executed on the target user's system.

  3. U-160: Google Chrome Multiple Flaws Let Remote Users Execute Arbitrary Code

    Broader source: Energy.gov [DOE]

    Several vulnerabilities were reported in Google Chrome. A remote user can cause arbitrary code to be executed on the target user's system

  4. U-004:Google Chrome Multiple Flaws Let Remote Users Execute Arbitrary Code

    Broader source: Energy.gov [DOE]

    A remote user can create HTML that, when loaded by the target user, will execute arbitrary code on the target user's system.

  5. U-144:Juniper Secure Access Input Validation Flaw Permits Cross...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    4:Juniper Secure Access Input Validation Flaw Permits Cross-Site Scripting Attacks U-144:Juniper Secure Access Input Validation Flaw Permits Cross-Site Scripting Attacks April 10,...

  6. Sandia Wind-Turbine Blade Flaw Detection Experiments in Denmark

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Wind-Turbine Blade Flaw Detection Experiments in Denmark - Sandia Energy Energy Search ... Twitter Google + Vimeo GovDelivery SlideShare Sandia Wind-Turbine Blade Flaw Detection ...

  7. U-001:Symantec IM Manager Input Validation Flaws

    Broader source: Energy.gov [DOE]

    Symantec IM Manager Input Validation Flaws Permit Cross-Site Scripting, SQL Injection, and Code Execution Attacks.

  8. Procedure for flaw detection in cast stainless steel

    DOE Patents [OSTI]

    Kupperman, David S.

    1988-01-01

    A method of ultrasonic flaw detection in cast stainless steel components incorporating the steps of determining the nature of the microstructure of the cast stainless steel at the site of the flaw detection measurements by ultrasonic elements independent of the component thickness at the site; choosing from a plurality of flaw detection techniques, one such technique appropriate to the nature of the microstructure as determined and detecting flaws by use of the chosen technique.

  9. Ultrasonic Flaw Detection of Cracks and Machined Flaws as Observed Through Austenitic Stainless Steel Piping Welds

    SciTech Connect (OSTI)

    Anderson, Michael T.; Cinson, Anthony D.; Crawford, Susan L.; Cumblidge, Stephen E.; Diaz, Aaron A.

    2009-07-01

    Piping welds in the pressure boundary of light water reactors (LWRs) are subject to a volumetric examination based on Section XI of the American Society of Mechanical Engineers (ASME) Boiler and Pressure Vessel Code. Due to access limitations and high background radiation levels, the technique used is primarily ultrasonic rather than radiographic. Many of the austenitic welds in safety-related piping systems provide limited access to both sides of the weld, so a far-side examination is necessary. Historically, far-side inspections have performed poorly because of the coarse and elongated grains that make up the microstructures of austenitic weldments. The large grains cause the ultrasound to be scattered, attenuated, and redirected. Additionally, grain boundaries or weld geometry may reflect coherent ultrasonic echoes, making flaw detection and discrimination a more challenging endeavor. Previous studies conducted at the Pacific Northwest National Laboratory (PNNL) on ultrasonic far-side examinations in austenitic piping welds involved the application of conventional transducers, use of low-frequency Synthetic Aperture Focusing Techniques (SAFT), and ultrasonic phased-array (PA) methods on specimens containing implanted thermal fatigue cracks and machined reflectors [1-2]. From these studies, PA inspection provided the best results, detecting nearly all of the flaws from the far side. These results were presented at the Fifth International Conference on NDE in Relation to Structural Integrity for Nuclear and Pressurised Components in 2006. This led to an invitation to examine field-removed specimens containing service-induced intergranular stress corrosion cracks (IGSCC) at the Electric Power Research Institute’s (EPRI) Nondestructive Evaluation (NDE) Center, in Charlotte, North Carolina. Results from this activity are presented.

  10. U-007: IBM Rational AppScan Import/Load Function Flaws Let Remote Users Execute Arbitrary Code

    Broader source: Energy.gov [DOE]

    Two vulnerabilities were reported in IBM Rational AppScan. A remote user can cause arbitrary code to be executed on the target user's system.

  11. V-058: Microsoft Internet Explorer CDwnBindInfo Object Reuse Flaw Lets Remote Users Execute Arbitrary Code

    Broader source: Energy.gov [DOE]

    A vulnerability was reported in Microsoft Internet Explorer. A remote user can cause arbitrary code to be executed on the target user's system.

  12. U-230: Sudo on Red Hat Enterprise Linux %postun Symlink Flaw Lets Local Users Gain Elevated Privileges

    Office of Energy Efficiency and Renewable Energy (EERE)

    An updated sudo package that fixes one security issue and several bugs is now available for Red Hat Enterprise Linux 5.

  13. U-014: Oracle Java Runtime Environment (JRE) Multiple Flaws Let Remote Users Execute Arbitrary Code and Deny Service

    Broader source: Energy.gov [DOE]

    A remote user can create a Java applet or Java Web Start application that, when loaded by the target user, will access or modify data or execute arbitrary code on the target user's system.

  14. U-006:Cisco Network Admission Control Manager Directory Traversal Flaw Lets Remote Users Obtain Potentially Sensitive Information

    Office of Energy Efficiency and Renewable Energy (EERE)

    An unauthenticated attacker could exploit this vulnerability to access sensitive information, including password files and system logs, that could be leveraged to launch subsequent attacks.

  15. U-015: CiscoWorks Common Services Home Page Input Validation Flaw Lets Remote Users Execute Arbitrary Commands

    Broader source: Energy.gov [DOE]

    Successful exploitation of this vulnerability may allow an authenticated, remote attacker to execute arbitrary commands on the affected system with the privileges of a system administrator.

  16. U-193: NetBSD System Call Return Value Validation Flaw Lets Local Users Gain Elevated Privileges

    Broader source: Energy.gov [DOE]

    On Intel CPUs, the sysret instruction can be manipulated into returning to specific non-canonical addresses, which may yield a CPU reset. We cannot currently rule out with utter confidence that this vulnerability could not also be used to execute code with kernel privilege instead of crashing the system.

  17. Spotlight on Austin, Texas: Let Your Contractor Be Your Guide...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Let Your Contractor Be Your Guide for Big Rewards Spotlight on Austin, Texas: Let Your Contractor Be Your Guide for Big Rewards Spotlight on Austin, Texas: Let Your Contractor Be ...

  18. V-112: Microsoft SharePoint Input Validation Flaws Permit Cross...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Input Validation Flaws Permit Cross-Site Scripting and Denial of Service Attacks V-112: Microsoft SharePoint Input Validation Flaws Permit Cross-Site Scripting and Denial...

  19. V-168: Splunk Web Input Validation Flaw Permits Cross-Site Scripting...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    8: Splunk Web Input Validation Flaw Permits Cross-Site Scripting Attacks V-168: Splunk Web Input Validation Flaw Permits Cross-Site Scripting Attacks May 31, 2013 - 6:00am Addthis...

  20. V-124: Splunk Web Input Validation Flaw Permits Cross-Site Scripting...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    4: Splunk Web Input Validation Flaw Permits Cross-Site Scripting Attacks V-124: Splunk Web Input Validation Flaw Permits Cross-Site Scripting Attacks April 2, 2013 - 1:13am Addthis...

  1. V-149: Microsoft Internet Explorer Object Access Bug Lets Remote...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    9: Microsoft Internet Explorer Object Access Bug Lets Remote Users Execute Arbitrary Code V-149: Microsoft Internet Explorer Object Access Bug Lets Remote Users Execute Arbitrary...

  2. V-235: Cisco Mobility Services Engine Configuration Error Lets...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    5: Cisco Mobility Services Engine Configuration Error Lets Remote Users Login Anonymously V-235: Cisco Mobility Services Engine Configuration Error Lets Remote Users Login ...

  3. V-202: Cisco Video Surveillance Manager Bugs Let Remote Users...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Video Surveillance Manager Bugs Let Remote Users Obtain Potentially Sensitive Information V-202: Cisco Video Surveillance Manager Bugs Let Remote Users Obtain Potentially Sensitive...

  4. V-155: Apache Tomcat FORM Authenticator Lets Remote Users Conduct...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    5: Apache Tomcat FORM Authenticator Lets Remote Users Conduct Session Fixation Attacks V-155: Apache Tomcat FORM Authenticator Lets Remote Users Conduct Session Fixation Attacks...

  5. V-220: Juniper Security Threat Response Manager Lets Remote Authentica...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Threat Response Manager Lets Remote Authenticated Users Execute Arbitrary Commands V-220: Juniper Security Threat Response Manager Lets Remote Authenticated Users Execute...

  6. U-047: Siemens Automation License Manager Bugs Let Remote Users...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    7: Siemens Automation License Manager Bugs Let Remote Users Deny Service or Execute Arbitrary Code U-047: Siemens Automation License Manager Bugs Let Remote Users Deny Service or...

  7. T-728: Apache Tomcat HTTP DIGEST Authentication Weaknesses Let...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    8: Apache Tomcat HTTP DIGEST Authentication Weaknesses Let Remote Users Conduct Bypass Attacks T-728: Apache Tomcat HTTP DIGEST Authentication Weaknesses Let Remote Users Conduct...

  8. T-707: Apache Tomcat AJP Protocol Processing Bug Lets Remote...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    AJP Protocol Processing Bug Lets Remote Users Bypass Authentication or Obtain Information T-707: Apache Tomcat AJP Protocol Processing Bug Lets Remote Users Bypass Authentication...

  9. Fabrication Flaw Density and Distribution In Repairs to Reactor Pressure Vessel and Piping Welds

    SciTech Connect (OSTI)

    GJ Schuster, FA Simonen, SR Doctor

    2008-04-01

    The Pacific Northwest National Laboratory is developing a generalized fabrication flaw distribution for the population of nuclear reactor pressure vessels and for piping welds in U.S. operating reactors. The purpose of the generalized flaw distribution is to predict component-specific flaw densities. The estimates of fabrication flaws are intended for use in fracture mechanics structural integrity assessments. Structural integrity assessments, such as estimating the frequency of loss-of-coolant accidents, are performed by computer codes that require, as input, accurate estimates of flaw densities. Welds from four different reactor pressure vessels and a collection of archived pipes have been studied to develop empirical estimates of fabrication flaw densities. This report describes the fabrication flaw distribution and characterization in the repair weld metal of vessels and piping. This work indicates that large flaws occur in these repairs. These results show that repair flaws are complex in composition and sometimes include cracks on the ends of the repair cavities. Parametric analysis using an exponential fit is performed on the data. The relevance of construction records is established for describing fabrication processes and product forms. An analysis of these records shows there was a significant change in repair frequency over the years when these components were fabricated. A description of repair flaw morphology is provided with a discussion of fracture mechanics significance. Fabrication flaws in repairs are characterized using optimized-access, high-sensitivity nondestructive ultrasonic testing. Flaw characterizations are then validated by other nondestructive evaluation techniques and complemented by destructive testing.

  10. NON-DESTRUCTIVE METHOD AND MEANS FOR FLAW DETECTION

    DOE Patents [OSTI]

    Hochschild, R.

    1959-03-10

    BS>An improved method is presented for the nondestructive detection of flaws in olectrictilly conductivc articles using magnetic field. According to thc method a homogoneous mignetic field is established in the test article;it right angle" to the artyicle. A probe is aligned with its axis transverse to the translates so hat th4 probe scans the surface of the test article while the axis of the robe is transverse to the direction of translation of the article. In this manner any output current obtained in thc probe is an indication of the size and location of a flaw in the article under test, with a miiiimum of signal pick- up in the probe from the established magnetic field.

  11. U-093: Mozilla Firefox Multiple Flaws Permit Remote Code Execution, Information Disclosure, and Cross-Site Scripting Attacks

    Broader source: Energy.gov [DOE]

    Mozilla Firefox Multiple Flaws Permit Remote Code Execution, Information Disclosure, and Cross-Site Scripting.

  12. Method for fabricating prescribed flaws in the interior of metals

    DOE Patents [OSTI]

    Hsu, David K.; Thompson, Donald O.

    1989-03-07

    The method for fabricating a metal body having a flaw of predetermined size and shape located therein comprises placing half of the metal powder required to make the metal body in the die of a press and pressing it to create a flat upper surface thereon. A piece of copper foil is cut to the size and shape of the desired interior crack and placed on the upper surface of the powder and centered in position. The remaining powder is then placed in the die to cover the copper foil. The powder is first cold pressed and removed from the press. The powder metal piece is then sintered in a furnace at a temperature above the melting point of the copper and below the melting point of the metal. It is then removed from the furnace, cooled to room temperature, and placed back in the die and pressed further. This procedure results in an interior flaw or crack. Modified forms of the method involve using a press-sinter-press-sinter cycle with the first sinter being below the melting point of the copper and the second sinter being above the melting point of the copper and below the melting point of the metal.

  13. Eddy current probe and method for flaw detection in metals

    DOE Patents [OSTI]

    Watjen, J.P.

    1987-06-23

    A flaw detecting system is shown which includes a probe having a pair of ferrite cores with in-line gaps in close proximity to each other. An insulating, non-magnetic, non-conducting holder fills the gaps and supports the ferrite cores in a manner such that the cores form a generally V-shape. Each core is provided with an excitation winding and a detection winding. The excitation windings are connected in series or parallel with an rf port for connection thereof to a radio frequency source. The detection windings, which are differentially wound, are connected in series circuit to a detector port for connection to a voltage measuring instrument. The ferrite cores at the in-line gaps directly engage the metal surface of a test piece, and the probe is scanned along the test piece. In the presence of a flaw in the metal surface the detection winding voltages are unbalanced, and the unbalance is detected by the voltage measuring instrument. The insulating holder is provided with a profile which conforms to that of a prominent feature of the test piece to facilitate movement of the probe along the feature, typically an edge or a corner. 9 figs.

  14. Eddy current probe and method for flaw detection in metals

    DOE Patents [OSTI]

    Watjen, John P.

    1987-06-23

    A flaw detecting system is shown which includes a probe having a pair of ferrite cores with in-line gaps in close proximity to each other. An insulating, non-magnetic, non-conducting holder fills the gaps and supports the ferrite cores in a manner such that the cores form a generally V-shape. Each core is provided with an excitation winding and a detection winding. The excitation windings are connected in series or parallel with an rf port for connection thereof to a radio frequency source. The detection windings, which are differentially wound, are connected in series circuit to a detector port for connection to a voltage measuring instrument. The ferrite cores at the in-line gaps directly engage the metal surface of a test piece, and the probe is scanned along the test piece. In the presence of a flaw in the metal surface the detection winding voltages are unbalanced, and the unbalance is detected by the voltage measuring instrument. The insulating holder is provided with a profile which conforms to that of a prominent feature of the test piece to facilitate movement of the probe along the feature, typically an edge or a corner.

  15. U-212: RSA Authentication Manager Flaws Permit Cross-Site and Cross-Frame

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Scripting and URL Redirection Attacks | Department of Energy 12: RSA Authentication Manager Flaws Permit Cross-Site and Cross-Frame Scripting and URL Redirection Attacks U-212: RSA Authentication Manager Flaws Permit Cross-Site and Cross-Frame Scripting and URL Redirection Attacks July 13, 2012 - 7:00am Addthis PROBLEM: RSA Authentication Manager Flaws Permit Cross-Site and Cross-Frame Scripting and URL Redirection Attacks PLATFORM: RSA Authentication Manager 7.1 is vulnerable; other

  16. Defining a Possible Low LET Bystander Effect

    SciTech Connect (OSTI)

    Charles R. Geard

    2009-05-04

    Current radiation protection guidelines assume a linear response to ionizing radiations down through doses where epidemiological studies provide very limited to no information as to the propriety of such assumptions. The bystander response is a non-targeted effect which might impact such guidelines. These studies while clearly affirming a bystander response for high LET radiations, do not provide such affirmation for environmentally relevant low dose, low LET radiations. Caution and further study are necessary before making judgements that could impact on current standards.

  17. Fabrication Flaw Density and Distribution in the Repairs of Reactor Pressure Vessels

    SciTech Connect (OSTI)

    Schuster, George J.; Doctor, Steven R.; Simonen, Fredric A.

    2006-02-15

    The Pacific Northwest National Laboratory (PNNL) is developing a generalized flaw size and density distribution for the population of U.S. reactor pressure vessels (RPVs). The purpose of the generalized flaw distribution is to predict vessel specific flaw rates for use in probabilistic fracture mechanics calculations that estimate vessel failure probability. Considerable progress has been made on the construction of an engineering data base of fabrication flaws in U.S. nuclear RPVs. The fabrication processes and product forms used to construct U.S. RPVs are represented in the data base. A validation methodology has been developed for characterizing the flaws for size, shape, orientation, and composition. The relevance of construction records has been established for describing fabrication processes and product forms. The fabrication flaws were detected in material removed from cancelled nuclear power plants using high sensitivity nondestructive ultrasonic testing, and validated by other nondestructive evaluation (NDE) techniques, and complemented by destructive testing. This paper describes research that has generated data on welding flaws, which indicated that the largest flaws occur in weld repairs. Recent research results confirm that repair flaws are complex in composition and may include cracks on the repair ends. Section III of the American Society of Mechanical Engineers (ASME) Boiler and Pressure Vessel Code for nuclear power plant components requires radiographic examinations (RT) of welds and requires repairs for RT indications that exceed code acceptable sizes. PNNL has previously obtained the complete construction records for two RPVs. Analysis of these records show a significant change in repair frequency.

  18. U-238: HP Service Manager Input Validation Flaw Permits Cross-Site Scripting Attacks

    Broader source: Energy.gov [DOE]

    Cross-site scripting (XSS) vulnerability in HP Service Manager Web Tier 7.11, 9.21, and 9.30, and HP Service Center Web Tier 6.28, allows remote attackers to inject arbitrary web script or HTML via unspecified vectors.

  19. V-127: Samba Bug Lets Remote Authenticated Users Modify Files...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    7: Samba Bug Lets Remote Authenticated Users Modify Files V-127: Samba Bug Lets Remote Authenticated Users Modify Files April 5, 2013 - 6:00am Addthis PROBLEM: A vulnerability was...

  20. INFOGRAPHIC: Let's Get to Work on Solar Soft Costs | Department...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Let's Get to Work on Solar Soft Costs INFOGRAPHIC: Let's Get to Work on Solar Soft Costs December 2, 2013 - 1:00pm Addthis Learn how soft costs are contributing to the price of ...

  1. Solar Decathlon 2015: Let the Competition Begin | Department...

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Let the Competition Begin Solar Decathlon 2015: Let the Competition Begin February 13, 2014 - 1:00pm Addthis The Solar Decathlon competition has provided more than 17,000 college ...

  2. Unspecified technologies | Open Energy Information

    Open Energy Info (EERE)

    Solar Thermal Process Heat Solar Water Heat Energy Storage Wind Yes Public Sector Energy Efficiency Aggregation Program State Grant Program Illinois Fed. Government Institutional...

  3. Sandia National Laboratories: Let it rain

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Let it rain By Karli Massey Thursday, September 01, 2016 Sandia's clean water stewards focus on stormwater runoff Sandia experts, students explore mechanical challenges at summer institute Environmental technical professional John Kay (4141) inspects a construction site at Sandia before a storm to ensure proper protection measures are in place near stormwater drains. Monsoon season is well underway in New Mexico and other areas across the Southwest. The flash floods caused by monsoon storms

  4. T-701: Citrix Access Gateway Enterprise Edition Input Validation Flaw in Logon Portal Permits Cross-Site Scripting Attacks

    Broader source: Energy.gov [DOE]

    Citrix Access Gateway Enterprise Edition Input Validation Flaw in Logon Portal Permits Cross-Site Scripting Attacks.

  5. U-206: WordPress Flaws Permit Cross-Site Scripting, Cross-Site...

    Broader source: Energy.gov (indexed) [DOE]

    WordPress Flaws Permit Cross-Site Scripting, Cross-Site Request Forgery, and Information Disclosure Attacks PLATFORM: Version(s): prior to 3.4.1 ABSTRACT: Several vulnerabilities...

  6. T-602: BlackBerry Enterprise Server Input Validation Flaw in...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    02: BlackBerry Enterprise Server Input Validation Flaw in BlackBerry Web Desktop Manager Permits Cross-Site Scripting Attacks T-602: BlackBerry Enterprise Server Input Validation...

  7. Identify Structural Flaw Location and Type with an Inverse Algorithm of Resonance Inspection

    SciTech Connect (OSTI)

    Xu, Wei; Lai, Canhai; Sun, Xin

    2015-10-20

    To evaluate the fitness-for-service of a structural component and to quantify its remaining useful life, aging and service-induced structural flaws must be quantitatively determined in service or during scheduled maintenance shutdowns. Resonance inspection (RI), a non-destructive evaluation (NDE) technique, distinguishes the anomalous parts from the good parts based on changes in the natural frequency spectra. Known for its numerous advantages, i.e., low inspection cost, high testing speed, and broad applicability to complex structures, RI has been widely used in the automobile industry for quality inspection. However, compared to other contemporary direct visualization-based NDE methods, a more widespread application of RI faces a fundamental challenge because such technology is unable to quantify the flaw details, e.g. location, dimensions, and types. In this study, the applicability of a maximum correlation-based inverse RI algorithm developed by the authors is further studied for various flaw cases. It is demonstrated that a variety of common structural flaws, i.e. stiffness degradation, voids, and cracks, can be accurately retrieved by this algorithm even when multiple different types of flaws coexist. The quantitative relations between the damage identification results and the flaw characteristics are also developed to assist the evaluation of the actual state of health of the engineering structures.

  8. V-151: RSA Archer eGRC Bugs Let Remote Authenticated Users Upload...

    Energy Savers [EERE]

    Users Upload Files and Let Remote Users Conduct Cross-Site Scripting Attacks V-151: RSA Archer eGRC Bugs Let Remote Authenticated Users Upload Files and Let Remote Users ...

  9. U-259: RSA BSAFE SSL-C Lets Remote Users Decrypt SSL/TLS Traffic...

    Office of Environmental Management (EM)

    59: RSA BSAFE SSL-C Lets Remote Users Decrypt SSLTLS Traffic and SSL Buffer Overflow Lets Remote Users Execute Arbitrary Code U-259: RSA BSAFE SSL-C Lets Remote Users Decrypt SSL...

  10. Development of flaw acceptance criteria for aging management of spent nuclear fuel multi-purpose canisters

    SciTech Connect (OSTI)

    Lam, Poh -Sang; Sindelar, Robert L.

    2015-03-09

    A typical multipurpose canister (MPC) is made of austenitic stainless steel and is loaded with spent nuclear fuel assemblies. The canister may be subject to service-induced degradation when it is exposed to aggressive atmospheric environments during a possibly long-term storage period if the permanent repository is yet to be identified and readied. Because heat treatment for stress relief is not required for the construction of an MPC, stress corrosion cracking may be initiated on the canister surface in the welds or in the heat affected zone. An acceptance criteria methodology is being developed for flaw disposition should the crack-like defects be detected by periodic in-service Inspection. The first-order instability flaw sizes has been determined with bounding flaw configurations, that is, through-wall axial or circumferential cracks, and part-through-wall long axial flaw or 360° circumferential crack. The procedure recommended by the American Petroleum Institute (API) 579 Fitness-for-Service code (Second Edition) is used to estimate the instability crack length or depth by implementing the failure assessment diagram (FAD) methodology. The welding residual stresses are mostly unknown and are therefore estimated with the API 579 procedure. It is demonstrated in this paper that the residual stress has significant impact on the instability length or depth of the crack. The findings will limit the applicability of the flaw tolerance obtained from limit load approach where residual stress is ignored and only ligament yielding is considered.

  11. Development of flaw acceptance criteria for aging management of spent nuclear fuel multiple-purpose canisters

    SciTech Connect (OSTI)

    Lam, P.; Sindelar, R.

    2015-03-09

    A typical multipurpose canister (MPC) is made of austenitic stainless steel and is loaded with spent nuclear fuel assemblies. The canister may be subject to service-induced degradation when it is exposed to aggressive atmospheric environments during a possibly long-term storage period if the permanent repository is yet to be identified and readied. Because heat treatment for stress relief is not required for the construction of an MPC, stress corrosion cracking may be initiated on the canister surface in the welds or in the heat affected zone. An acceptance criteria methodology is being developed for flaw disposition should the crack-like defects be detected by periodic In-service Inspection. The first-order instability flaw sizes has been determined with bounding flaw configurations, that is, through-wall axial or circumferential cracks, and part-through-wall long axial flaw or 360° circumferential crack. The procedure recommended by the American Petroleum Institute (API) 579 Fitness-for-Service code (Second Edition) is used to estimate the instability crack length or depth by implementing the failure assessment diagram (FAD) methodology. The welding residual stresses are mostly unknown and are therefore estimated with the API 579 procedure. It is demonstrated in this paper that the residual stress has significant impact on the instability length or depth of the crack. The findings will limit the applicability of the flaw tolerance obtained from limit load approach where residual stress is ignored and only ligament yielding is considered.

  12. U-005: Apache mod_proxy Pattern Matching Bug Lets Remote Users...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    5: Apache modproxy Pattern Matching Bug Lets Remote Users Access Internal Servers U-005: Apache modproxy Pattern Matching Bug Lets Remote Users Access Internal Servers October 6,...

  13. U-142: HP Onboard Administrator Bugs Let Remote Users Gain Access...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    2: HP Onboard Administrator Bugs Let Remote Users Gain Access, Obtain Information, and Conduct URL Redirection Attacks U-142: HP Onboard Administrator Bugs Let Remote Users Gain...

  14. U-046: Apache mod_proxy/mod_rewrite Bug Lets Remote Users Access...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    6: Apache modproxymodrewrite Bug Lets Remote Users Access Internal Servers U-046: Apache modproxymodrewrite Bug Lets Remote Users Access Internal Servers November 28, 2011 -...

  15. U-279: Cisco Firewall Services Module Bugs Let Remote Users Execute...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    79: Cisco Firewall Services Module Bugs Let Remote Users Execute Arbitrary Code and Deny Service U-279: Cisco Firewall Services Module Bugs Let Remote Users Execute Arbitrary Code ...

  16. U-159: Red Hat Enterprise MRG Messaging Qpid Bug Lets Certain...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    9: Red Hat Enterprise MRG Messaging Qpid Bug Lets Certain Remote Users Bypass Authentication U-159: Red Hat Enterprise MRG Messaging Qpid Bug Lets Certain Remote Users Bypass...

  17. V-195: RSA Authentication Manager Lets Local Users View the Administra...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    5: RSA Authentication Manager Lets Local Users View the Administrative Account Password V-195: RSA Authentication Manager Lets Local Users View the Administrative Account Password...

  18. V-172: ISC BIND RUNTIME_CHECK Error Lets Remote Users Deny Service...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    ISC BIND RUNTIMECHECK Error Lets Remote Users Deny Service Against Recursive Resolvers V-172: ISC BIND RUNTIMECHECK Error Lets Remote Users Deny Service Against Recursive...

  19. U-241: Adobe Flash Player Bugs Let Remote Users Execute Arbitrary...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    1: Adobe Flash Player Bugs Let Remote Users Execute Arbitrary Code and Obtain Information U-241: Adobe Flash Player Bugs Let Remote Users Execute Arbitrary Code and Obtain...

  20. V-229: IBM Lotus iNotes Input Validation Flaws Permit Cross-Site Scripting

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Attacks | Department of Energy 9: IBM Lotus iNotes Input Validation Flaws Permit Cross-Site Scripting Attacks V-229: IBM Lotus iNotes Input Validation Flaws Permit Cross-Site Scripting Attacks August 28, 2013 - 6:00am Addthis PROBLEM: Several vulnerabilities were reported in IBM Lotus iNotes PLATFORM: IBM Lotus iNotes 8.5.x ABSTRACT: IBM Lotus iNotes 8.5.x contains four cross-site scripting vulnerabilities REFERENCE LINKS: Security Tracker Alert ID 1028954 IBM Security Bulletin 1647740

  1. Flaws Identification Using Eddy Current Differential Transducer and Artificial Neural Networks

    SciTech Connect (OSTI)

    Chady, T.; Lopato, P.

    2006-03-06

    In this paper we present a multi-frequency excitation eddy current differential transducer and dynamic neural models which were used to detect and identify artificial flaws in thin conducting plates. Plates are made of Inconel600. EDM notches have relative depth from 10% to 80% and length from 2 mm to 7 mm. All flaws were located on the opposite surface of the examined specimen. Measured signals were used as input for training and verifying dynamic neural networks with a moving window. Wide range of ANN (Artificial Neural Network) structures are examined for different window length and different number of frequency components in excitation signal. Observed trends are presented in this paper.

  2. T-703: Cisco Unified Communications Manager Open Query Interface Lets

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Remote Users Obtain Database Contents | Department of Energy 703: Cisco Unified Communications Manager Open Query Interface Lets Remote Users Obtain Database Contents T-703: Cisco Unified Communications Manager Open Query Interface Lets Remote Users Obtain Database Contents August 26, 2011 - 3:45pm Addthis PROBLEM: A vulnerability was reported in Cisco Unified Communications Manager. A remote user can obtain database contents PLATFORM: Cisco Unified Communications Manager 6.x, 7.x, 8.0, 8.5

  3. Anisotropic determination and correction for ultrasonic flaw detection by spectral analysis

    DOE Patents [OSTI]

    Adler, Laszlo; Von Cook, K.; Simpson, Jr., William A.; Lewis, D. Kent

    1978-01-01

    The anisotropic nature of a material is determined by measuring the velocity of an ultrasonic longitudinal wave and a pair of perpendicular ultrasonic shear waves through a sample of the material each at a plurality of different angles in three planes orthogonal to each other. The determined anisotropic nature is used as a correction factor in a spectral analyzing system of flaw determination.

  4. Apparatus and method for detecting and/or measuring flaws in conductive material

    DOE Patents [OSTI]

    Hockey, Ronald L.; Riechers, Douglas M.

    2000-01-01

    The present invention uses a magnet and sensor coil unilaterial and in relative motion to a conductive material, to measure perturbation or variation in the magnetic field in the presence of a flaw. A liftoff compensator measures a distance between the conductive material and the magnet.

  5. T-707: Apache Tomcat AJP Protocol Processing Bug Lets Remote Users Bypass Authentication or Obtain Information

    Broader source: Energy.gov [DOE]

    Apache Tomcat AJP protocol processing bug lets remote users bypass authentication or obtain information.

  6. V-151: RSA Archer eGRC Bugs Let Remote Authenticated Users Upload Files and

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Let Remote Users Conduct Cross-Site Scripting Attacks | Department of Energy 51: RSA Archer eGRC Bugs Let Remote Authenticated Users Upload Files and Let Remote Users Conduct Cross-Site Scripting Attacks V-151: RSA Archer eGRC Bugs Let Remote Authenticated Users Upload Files and Let Remote Users Conduct Cross-Site Scripting Attacks May 8, 2013 - 12:06am Addthis PROBLEM: RSA Archer eGRC Bugs Let Remote Authenticated Users Upload Files and Let Remote Users Conduct Cross-Site Scripting Attacks

  7. Flaw Stability Considering Residual Stress for Aging Management of Spent Nuclear Fuel Multiple-Purpose Canisters

    DOE Public Access Gateway for Energy & Science Beta (PAGES Beta)

    Lam, Poh-Sang; Sindelar, Robert L.

    2016-04-28

    A typical multipurpose canister (MPC) is made of austenitic stainless steel and is loaded with spent nuclear fuel assemblies. Because heat treatment for stress relief is not required for the construction of the MPC, the canister is susceptible to stress corrosion cracking in the weld or heat affected zone regions under long-term storage conditions. Logic for flaw acceptance is developed should crack-like flaws be detected by Inservice Inspection. The procedure recommended by API 579-1/ASME FFS-1, Fitness-for-Service, is used to calculate the instability crack length or depth by failure assessment diagram. It is demonstrated that the welding residual stress has amore » strong influence on the results.« less

  8. Improved multi-directional eddy current inspection test apparatus for detecting flaws in metal articles

    DOE Patents [OSTI]

    Nance, Roy A.; Hartley, William H.; Caffarel, Alfred J.

    1984-01-01

    Apparatus is described for detecting flaws in a tubular workpiece in a single scan. The coils of a dual coil bobbin eddy current inspection probe are wound at a 45.degree. angle to the transverse axis of the probe, one coil having an angular position about the axis about 90.degree. relative to the angular position of the other coil, and the angle of intersection of the planes containing the coils being about 60.degree..

  9. Intense X-rays expose tiny flaws in 3-D printed titanium that can lead to

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    breakage over time | Argonne National Laboratory Intense X-rays expose tiny flaws in 3-D printed titanium that can lead to breakage over time By Katie Elyce Jones * March 4, 2016 Tweet EmailPrint Titanium is strong but light - a desirable property among metals. In the twentieth century, titanium was used in military aircraft and equipment and commercial jets. Today, we find this tough and flexible metal all around us - in sports gear, tools, surgical and dental implants, prosthetics,

  10. Thermal wave image processing for characterization of subsurface of flaws in materials

    SciTech Connect (OSTI)

    Gopalan, K.; Gopalsami, N.

    1993-08-01

    Infrared images resulting from back-scattered thermal waves in composite materials are corrupted by instrument noise and sample heat-spread function. This paper demonstrates that homomorphic deconvolution and {open_quotes}demultiplication{close_quotes} result in enhanced image quality for characterization of subsurface flaws in Kevlar and graphics composites. The choice of processing depends on the material characteristics and the extent of noise in the original image.

  11. Stress-intensity-factor influence coefficients for semielliptical inner-surface flaws in clad pressure vessels

    SciTech Connect (OSTI)

    Keeney, J.A.; Bryson, J.W.

    1995-12-31

    A problem of particular interest in pressure vessel technology is the calculation of accurate stress-intensity factors for semielliptical surface cracks in cylinders. Computing costs for direct solution techniques can be prohibitive when applied to three-dimensional (3-D) geometries with time-varying boundary conditions such as those associated with pressurized thermal shock. An alternative superposition technique requires the calculation of a set of influence coefficients for a given 3-D crack model that can be superimposed to obtain mode-I stress-intensity factors. This paper presents stress-intensity-factor influence coefficients (SIFICs) for axially and circumferentially oriented finite-length semielliptical inner-surface flaws with aspect ratios (total crack length (2c) to crack depth (a)) of 2, 6, and 10 for clad cylinders having an internal radius to wall thickness (t) ratio of 10. SIFICs are computed for flaw depths in the range of 0.01 {le} a/t {le} 0.5 and two cladding thicknesses. The incorporate of this SIFIC data base in fracture mechanics codes will facilitate the generation of fracture mechanics solutions for a wide range of flaw geometries as may be required in structural integrity assessments of pressurized-water and boiling-water reactors.

  12. U-092: Sudo Format String Bug Lets Local Users Gain Elevated Privileges

    Broader source: Energy.gov [DOE]

    A local user can supply a specially crafted command line argument to trigger a format string flaw and execute arbitrary commands on the target system with root privileges.

  13. Evaluation of Manual Ultrasonic Examinations Applied to Detect Flaws in Primary System Dissimilar Metal Welds at North Anna Power Station

    SciTech Connect (OSTI)

    Anderson, Michael T.; Diaz, Aaron A.; Doctor, Steven R.

    2012-06-01

    During a recent inservice inspection (ISI) of a dissimilar metal weld (DMW) in an inlet (hot leg) steam generator nozzle at North Anna Power Station Unit 1, several axially oriented flaws went undetected by the licensee's manual ultrasonic testing (UT) technique. The flaws were subsequently detected as a result of outside diameter (OD) surface machining in preparation for a full structural weld overlay. The machining operation uncovered the existence of two through-wall flaws, based on the observance of primary water leaking from the DMW. Further ultrasonic tests were then performed, and a total of five axially oriented flaws, classified as primary water stress corrosion cracking (PWSCC), were detected in varied locations around the weld circumference.

  14. V-140: Apache ActiveMQ Bugs Let Remote Users Conduct Cross-Site...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    0: Apache ActiveMQ Bugs Let Remote Users Conduct Cross-Site Scripting Attacks, Deny Service, and Obtain Potentially Sensitive Information V-140: Apache ActiveMQ Bugs Let Remote...

  15. U-029: TCP/IP Services for OpenVMS POP/IMAP Service Bug Lets...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    9: TCPIP Services for OpenVMS POPIMAP Service Bug Lets Remote Users Gain Unauthorized Access U-029: TCPIP Services for OpenVMS POPIMAP Service Bug Lets Remote Users Gain...

  16. V-144: HP Printers Let Remote Users Access Files on the Printer...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    4: HP Printers Let Remote Users Access Files on the Printer V-144: HP Printers Let Remote Users Access Files on the Printer April 29, 2013 - 12:27am Addthis PROBLEM: HP Printers...

  17. V-194: Citrix XenServer Memory Management Error Lets Local Administrat...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    XenServer Memory Management Error Lets Local Administrative Users on the Guest Gain Access on the Host V-194: Citrix XenServer Memory Management Error Lets Local Administrative...

  18. V-147: IBM Lotus Notes Mail Client Lets Remote Users Execute...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    7: IBM Lotus Notes Mail Client Lets Remote Users Execute Java Applets V-147: IBM Lotus Notes Mail Client Lets Remote Users Execute Java Applets May 2, 2013 - 6:00am Addthis...

  19. U-056: Linux Kernel HFS Buffer Overflow Lets Local Users Gain...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    6: Linux Kernel HFS Buffer Overflow Lets Local Users Gain Root Privileges U-056: Linux Kernel HFS Buffer Overflow Lets Local Users Gain Root Privileges December 9, 2011 - 8:00am...

  20. V-189: Oracle VirtualBox 'tracepath' Bug Lets Local Guest Users...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Oracle VirtualBox 'tracepath' Bug Lets Local Guest Users Deny Service on the Target Host V-189: Oracle VirtualBox 'tracepath' Bug Lets Local Guest Users Deny Service on the Target...

  1. V-115: Apple iOS Bugs Let Local Users Gain Elevated Privileges...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    5: Apple iOS Bugs Let Local Users Gain Elevated Privileges V-115: Apple iOS Bugs Let Local Users Gain Elevated Privileges March 20, 2013 - 12:08am Addthis PROBLEM: Apple iOS Bugs...

  2. V-113: Apple Safari Bugs Let Remote Users Execute Arbitrary Code...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    3: Apple Safari Bugs Let Remote Users Execute Arbitrary Code V-113: Apple Safari Bugs Let Remote Users Execute Arbitrary Code March 18, 2013 - 1:53am Addthis PROBLEM: Apple Safari...

  3. V-184: Google Chrome Flash Plug-in Lets Remote Users Conduct...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    4: Google Chrome Flash Plug-in Lets Remote Users Conduct Clickjacking Attacks V-184: Google Chrome Flash Plug-in Lets Remote Users Conduct Clickjacking Attacks June 24, 2013 -...

  4. V-212: Samba smbd CPU Processing Loop Lets Remote Users Deny...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    2: Samba smbd CPU Processing Loop Lets Remote Users Deny Service V-212: Samba smbd CPU Processing Loop Lets Remote Users Deny Service August 6, 2013 - 6:00am Addthis PROBLEM: A...

  5. V-141: HP ElitePad 900 Secure Boot Bug Lets Local Users Boot...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    1: HP ElitePad 900 Secure Boot Bug Lets Local Users Boot to Other Operating Systems V-141: HP ElitePad 900 Secure Boot Bug Lets Local Users Boot to Other Operating Systems April...

  6. V-071: Cisco ASA 1000V Cloud Firewall H.323 Inspection Bug Lets...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    1: Cisco ASA 1000V Cloud Firewall H.323 Inspection Bug Lets Remote Users Deny Service V-071: Cisco ASA 1000V Cloud Firewall H.323 Inspection Bug Lets Remote Users Deny Service ...

  7. T-621: Citrix XenServer Lets Local Administrative Users on the...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    1: Citrix XenServer Lets Local Administrative Users on the Guest OS Deny Service T-621: Citrix XenServer Lets Local Administrative Users on the Guest OS Deny Service May 12, 2011 -...

  8. T-704: RSA enVision Lets Remote Users View Files and Remote Authentica...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    RSA enVision Lets Remote Users View Files and Remote Authenticated Users Obtain Password T-704: RSA enVision Lets Remote Users View Files and Remote Authenticated Users Obtain...

  9. V-045: Adobe ColdFusion Lets Local Users Bypass Sandbox Restrictions...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    5: Adobe ColdFusion Lets Local Users Bypass Sandbox Restrictions V-045: Adobe ColdFusion Lets Local Users Bypass Sandbox Restrictions December 12, 2012 - 2:00am Addthis PROBLEM:...

  10. V-203: HP LoadRunner Multiple Bugs Let Remote Users Deny Service...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    V-171: Apple Safari Bugs Let Remote Users Execute Arbitrary Code and Conduct Cross-Site Scripting Attacks V-110: Adobe Flash Player Bugs Let Remote Users Execute Arbitrary Code...

  11. V-110: Adobe Flash Player Bugs Let Remote Users Execute Arbitrary...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    0: Adobe Flash Player Bugs Let Remote Users Execute Arbitrary Code V-110: Adobe Flash Player Bugs Let Remote Users Execute Arbitrary Code March 13, 2013 - 12:04am Addthis PROBLEM:...

  12. U-082: McAfee SaaS 'myCIOScn.dll' ActiveX Control Lets Remote...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Lets Remote Users Execute Arbitrary Code January 17, 2012 - 1:00pm Addthis PROBLEM: PHP Null Pointer Dereference in zendstrndup() Lets Local Users Deny Service PLATFORM: PHP...

  13. Effect of stainless steel weld overlay cladding on the structural integrity of flawed steel plates in bending. Series 1

    SciTech Connect (OSTI)

    Corwin, W.R.; Robinson, G.C.; Nanstad, R.K.; Merkle, J.G.; Berggren, R.G.; Goodwin, G.M.; Swain, R.L.; Owings, T.D.

    1985-04-01

    The Heavy-Section Steel Technology (HSST) Stainless Steel Cladding Evaluations were undertaken to study the interaction of stainless steel cladding on the inside surface of a reactor pressure vessel with flaws initiating and propagating in base metal. With the more recent focus of safety studies on overcooling type transients, for which the behavior of small flaws is important, stainless steel cladding may have a key role in controlling the propagation and/or arrest of propagating flaws. A complicating factor in understanding the role of stainless steel cladding in this setting is the scarcity of data on its fracture toughness as a function of radiation dose and the fabrication process. The initial phase of the HSST evaluations addresses this question by testing the response of 51-mm-thick flawed plates clad with single-wire, submerged-arc weld overlays of different toughness levels. The tests completed indicate that cladding of moderate toughness had a limited ability to enhance the structural arrest toughness of a beam in bending. The specimen design and fabrication techniques employed for this first completed series of tests resulted in flaw and specimen configurations that prevented adequate control of the stress state at pop-in of the hydrogen-charged electron-beam welds. As a result, analyses of the tests by two approximate techniques and by the ORMGEN-ADINA-ORVIRT finite-element programs were not completely consistent.

  14. T-695: Avaya Aura Application Server Buffer Overflow in 'cstore.exe' Lets Remote Users Execute Arbitrary Code

    Broader source: Energy.gov [DOE]

    Avaya Aura Application Server Buffer Overflow in 'cstore.exe' Lets Remote Users Execute Arbitrary Code.

  15. U-259: RSA BSAFE SSL-C Lets Remote Users Decrypt SSL/TLS Traffic and SSL

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Buffer Overflow Lets Remote Users Execute Arbitrary Code | Department of Energy 59: RSA BSAFE SSL-C Lets Remote Users Decrypt SSL/TLS Traffic and SSL Buffer Overflow Lets Remote Users Execute Arbitrary Code U-259: RSA BSAFE SSL-C Lets Remote Users Decrypt SSL/TLS Traffic and SSL Buffer Overflow Lets Remote Users Execute Arbitrary Code September 13, 2012 - 6:00am Addthis PROBLEM: RSA BSAFE SSL-C Lets Remote Users Decrypt SSL/TLS Traffic and SSL Buffer Overflow Lets Remote Users Execute

  16. Fatigue flaw growth assessment and inclusion of stratification to the LBB assessment

    SciTech Connect (OSTI)

    Samohyl, P.

    1997-04-01

    The application of the LBB requires also fatigue flaw growth assessment. This analysis was performed for PWR nuclear power plants types VVER 440/230, VVER 440/213c, VVER 1000/320. Respecting that these NPP`s were designed according to Russian codes that differ from US codes it was needed to compare these approaches. Comparison with our experimental data was accomplished, too. Margins of applicability of the US methods and their modifications for the materials used for construction of Czech and Slovak NPP`s are shown. Computer code accomplishing the analysis according to described method is presented. Some measurement and calculations show that thermal stratifications in horizontal pipelines can lead to additive loads that are not negligible and can be dangerous. An attempt to include these loads induced by steady-state stratification was made.

  17. Spotlight on Austin, Texas: Let Your Contractor Be Your Guide for Big

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Rewards | Department of Energy Let Your Contractor Be Your Guide for Big Rewards Spotlight on Austin, Texas: Let Your Contractor Be Your Guide for Big Rewards Spotlight on Austin, Texas: Let Your Contractor Be Your Guide for Big Rewards, as posted on the U.S. Department of Energy's Better Buildings Neighborhood Program website. Spotlight on Austin, Texas (444.88 KB) More Documents & Publications Spotlight on Austin, Texas: Best Offer Ever Produces Upgrades in Record Time Spotlight on

  18. U-053: Linux kexec Bugs Let Local and Remote Users Obtain Potentially

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Sensitive Information | Department of Energy 53: Linux kexec Bugs Let Local and Remote Users Obtain Potentially Sensitive Information U-053: Linux kexec Bugs Let Local and Remote Users Obtain Potentially Sensitive Information December 7, 2011 - 7:30am Addthis PROBLEM: Linux kexec Bugs Let Local and Remote Users Obtain Potentially Sensitive Information . PLATFORM: Red Hat Enterprise Linux Desktop (v. 6) Red Hat Enterprise Linux HPC Node (v. 6) Red Hat Enterprise Linux Server (v. 6) Red Hat

  19. U-279: Cisco Firewall Services Module Bugs Let Remote Users Execute

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Arbitrary Code and Deny Service | Department of Energy 79: Cisco Firewall Services Module Bugs Let Remote Users Execute Arbitrary Code and Deny Service U-279: Cisco Firewall Services Module Bugs Let Remote Users Execute Arbitrary Code and Deny Service October 11, 2012 - 6:00am Addthis PROBLEM: Cisco Firewall Services Module Bugs Let Remote Users Execute Arbitrary Code and Deny Service PLATFORM: Version(s): prior to 4.1(9) ABSTRACT: Several vulnerabilities were reported in Cisco Firewall

  20. V-134: Cisco AnyConnect Secure Mobility Client Heap Overflow Lets Local

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Users Gain Elevated Privileges | Department of Energy 4: Cisco AnyConnect Secure Mobility Client Heap Overflow Lets Local Users Gain Elevated Privileges V-134: Cisco AnyConnect Secure Mobility Client Heap Overflow Lets Local Users Gain Elevated Privileges April 15, 2013 - 1:30am Addthis PROBLEM: Cisco AnyConnect Secure Mobility Client Heap Overflow Lets Local Users Gain Elevated Privileges PLATFORM: Cisco AnyConnect Secure Mobility Client Cisco Secure Desktop ABSTRACT: Some vulnerabilities

  1. V-135: Cisco ASA Multiple Bugs Let Remote Users Deny Service | Department

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    of Energy 5: Cisco ASA Multiple Bugs Let Remote Users Deny Service V-135: Cisco ASA Multiple Bugs Let Remote Users Deny Service April 16, 2013 - 12:21am Addthis PROBLEM: Cisco ASA Multiple Bugs Let Remote Users Deny Service PLATFORM: Cisco ASA Software for Cisco ASA 5500 Series Adaptive Security Appliances, Cisco ASA Services Module for Cisco Catalyst 6500 Series Switches and Cisco 7600 Series Routers, and Cisco ASA 1000V Cloud Firewall are affected by multiple vulnerabilities. Affected

  2. V-076: Cisco Wireless LAN Controller Bugs Let Remote Users Deny...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Cisco Wireless LAN Controller Bugs Let Remote Users Deny Service and Remote Authenticated Users Modify the Configuration and Execute Arbitrary Code V-076: Cisco Wireless LAN ...

  3. U-053: Linux kexec Bugs Let Local and Remote Users Obtain Potentially...

    Office of Environmental Management (EM)

    Linux kexec Bugs Let Local and Remote Users Obtain Potentially Sensitive Information . PLATFORM: Red Hat Enterprise Linux Desktop (v. 6) Red Hat Enterprise Linux HPC Node (v. 6) ...

  4. Debate response: Which rate designs provide revenue stability and efficient price signals? Let the debate continue.

    SciTech Connect (OSTI)

    Boonin, David Magnus

    2009-11-15

    Let's engage in further discussion that provides solutions and details, not just criticisms and assertions. Let's engage in a meaningful dialogue about the conditions where real-time pricing or critical peak pricing with decoupling or the SFV rate design with a feebate is most effective. (author)

  5. Let7a involves in neural stem cell differentiation relating with TLX level

    SciTech Connect (OSTI)

    Song, Juhyun; Cho, Kyoung Joo; Oh, Yumi; Lee, Jong Eun

    2015-07-10

    Neural stem cells (NSCs) have the potential for differentiation into neurons known as a groundbreaking therapeutic solution for central nervous system (CNS) diseases. To resolve the therapeutic efficiency of NSCs, recent researchers have focused on the study on microRNA's role in CNS. Some micro RNAs have been reported significant functions in NSC self-renewal and differentiation through the post-transcriptional regulation of neurogenesis genes. MicroRNA-Let7a (Let7a) has known as the regulator of diverse cellular mechanisms including cell differentiation and proliferation. In present study, we investigated whether Let7a regulates NSC differentiation by targeting the nuclear receptor TLX, which is an essential regulator of NSC self-renewal, proliferation and differentiation. We performed the following experiments: western blot analysis, TaqMan assay, RT-PCR, and immunocytochemistry to confirm the alteration of NSCs. Our data showed that let7a play important roles in controlling NSC fate determination. Thus, manipulating Let-7A and TLX could be a novel strategy to enhance the efficiency of NSC's neuronal differentiation for CNS disorders. - Highlights: • Let7a influences on NSC differentiation and proliferation. • Let7a involves in mainly NSC differentiation rather than proliferation. • Let7a positively regulates the TLX expression.

  6. Don't Let Your Money and Hot Water Go Down the Drain | Department...

    Energy Savers [EERE]

    Don't Let Your Money and Hot Water Go Down the Drain Don't Let Your Money and Hot Water Go Down the Drain December 9, 2008 - 4:00am Addthis John Lippert Do you look at your ...

  7. THE CHOICE OF OPTIMAL STRUCTURE OF ARTIFICIAL NEURAL NETWORK CLASSIFIER INTENDED FOR CLASSIFICATION OF WELDING FLAWS

    SciTech Connect (OSTI)

    Sikora, R.; Chady, T.; Baniukiewicz, P.; Caryk, M.; Piekarczyk, B.

    2010-02-22

    Nondestructive testing and evaluation are under continuous development. Currently researches are concentrated on three main topics: advancement of existing methods, introduction of novel methods and development of artificial intelligent systems for automatic defect recognition (ADR). Automatic defect classification algorithm comprises of two main tasks: creating a defect database and preparing a defect classifier. Here, the database was built using defect features that describe all geometrical and texture properties of the defect. Almost twenty carefully selected features calculated for flaws extracted from real radiograms were used. The radiograms were obtained from shipbuilding industry and they were verified by qualified operator. Two weld defect's classifiers based on artificial neural networks were proposed and compared. First model consisted of one neural network model, where each output neuron corresponded to different defect group. The second model contained five neural networks. Each neural network had one neuron on output and was responsible for detection of defects from one group. In order to evaluate the effectiveness of the neural networks classifiers, the mean square errors were calculated for test radiograms and compared.

  8. Non-destructive evaluation means and method of flaw reconstruction utilizing an ultrasonic multi-viewing transducer data acquistion system

    DOE Patents [OSTI]

    Thompson, Donald O.; Wormley, Samuel J.

    1989-03-28

    A multi-viewing ultrasound transducer acquisition system for non-destructive evaluation, flaw detection and flaw reconstruction in materials. A multiple transducer assembly includes a central transducer surrounded by a plurality of perimeter transducers, each perimeter transducer having an axis of transmission which can be angularly oriented with respect to the axis of transmission of the central transducer to intersect the axis of transmission of the central transducer. A control apparatus automatically and remotely positions the transducer assembly with respect to the material by a positioning apparatus and adjusts the pe GRANT REFERENCE This invention was conceived and reduced to practice at least in part under a grant from the Department of Energy under Contract No. W-7407-ENG-82.

  9. Technical basis for flawed cylinder test specification to assure adequate fracture resistance of ISO high-strength steel cylinder

    SciTech Connect (OSTI)

    Rana, M.D.; Smith, J.H.; Tribolet, R.O.

    1997-11-01

    High-pressure industrial gases (such as oxygen, nitrogen, argon, hydrogen, etc.) are stored and transported in portable cylinders. ISO TC58 SC3 has developed a draft specification 9809 for design and fabrication of high-pressure cylinders with maximum tensile strength limitation of 1,100 N/mm{sup 2}. In order to extend the ISO 9809 rules for higher than 1,100 N/mm{sup 2} strength level cylinders, a working group WG14 was formed in 1989 to develop new rules to assure adequate fracture resistance. In 1994, WG14 recommended a simple, but unique flawed cylinder test method for design qualification of the cylinder and acceptance criteria to assure adequate fracture resistance. WG14 also recommended Charpy-V-notch impact tests to control the required fracture resistance on production cylinders. This paper presents the technical basis that was employed in developing the flawed cylinder test method and acceptance criteria. The specification was developed for seamless steel cylinders having actual strength in the range of 1,100 to 1,400 N/mm{sup 2} and cylindrical section wall thickness in the range of 3 to 10 mm. Flawed cylinder tests were conducted on several hundred cylinders of varying sizes and strength levels. The specification requires to demonstrate LEAK-BEFORE-BREAK performance of the cylinder having flaw length equal to 1.6 (o.d. {times} t{sub design}){sup 0.5} at failure pressure = (t{sub design}/t{sub actual}) x Design Pressure.

  10. Technical basis for flawed cylinder test specification to assure adequate fracture resistance of ISO high strength steel cylinder

    SciTech Connect (OSTI)

    Rana, M.D.; Smith, J.H.; Tribolet, R.O.

    1996-12-01

    High pressure industrial gases (such as oxygen, nitrogen, argon, hydrogen, etc.) are stored and transported in portable cylinders. ISO TC58 SC3 has developed a draft specification 9809 for design and fabrication of high pressure cylinders with maximum tensile strength limitation of 1,100 N/mm{sup 2}. In order to extend the ISO 9809 rules for higher than 1,100 N/mm{sup 2} strength level cylinders, a working group WG14 was formed in 1989 to develop new rules to assure adequate fracture resistance. In 1994, WG14 recommended a simple, but unique flawed cylinder test method for design qualification of the cylinder and acceptance criteria to assure adequate fracture resistance. WG14 also recommended Charpy-V-Notch impact tests to control the required fracture resistance on production cylinders. This paper presents the technical basis that was employed in developing the flawed cylinder test method and acceptance criteria. The specification was developed for seamless steel cylinders having actual strength in the range of 1,100 to 1,400 N/mm{sup 2} and cylindrical section wall thickness in the range of 3mm to 10mm. Flawed cylinder tests were conducted on several hundred cylinders of varying sizes and strength levels. The specification requires to demonstrate LEAK-BEFORE-BREAK performance of the cylinder having flaw length equal to 1.6(O.D. {times} t{sub design}){sup 0.5} at failure pressure = (t{sub design}/t{sub actual}) {times} Design Pressure.

  11. T-606: Sun Java System Access Manager Lets Remote Users Partially Modify Data and Remote Authenticated Users Partially Access Data

    Broader source: Energy.gov [DOE]

    Sun Java System Access Manager Lets Remote Users Partially Modify Data and Remote Authenticated Users Partially Access Data.

  12. V-071: Cisco ASA 1000V Cloud Firewall H.323 Inspection Bug Lets Remote

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Users Deny Service | Department of Energy 1: Cisco ASA 1000V Cloud Firewall H.323 Inspection Bug Lets Remote Users Deny Service V-071: Cisco ASA 1000V Cloud Firewall H.323 Inspection Bug Lets Remote Users Deny Service January 17, 2013 - 12:00am Addthis PROBLEM: Cisco ASA 1000V Cloud Firewall H.323 Inspection Bug Lets Remote Users Deny Service PLATFORM: The vulnerability is reported in versions 8.7.1 and 8.7.1.1. ABSTRACT: A vulnerability has been reported in Cisco ASA 1000V Cloud Firewall

  13. T-545: RealPlayer Heap Corruption Error in 'vidplin.dll' Lets Remote Users

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Execute Arbitrary Code | Department of Energy 5: RealPlayer Heap Corruption Error in 'vidplin.dll' Lets Remote Users Execute Arbitrary Code T-545: RealPlayer Heap Corruption Error in 'vidplin.dll' Lets Remote Users Execute Arbitrary Code January 28, 2011 - 7:21am Addthis PROBLEM: RealPlayer Heap Corruption Error in 'vidplin.dll' Lets Remote Users Execute Arbitrary Code. PLATFORM: RealPlayer 14.0.1 and prior versions ABSTRACT: A vulnerability was reported in RealPlayer. A remote user can

  14. T-575: OpenLDAP back-ndb Lets Remote Users Authenticate Without a Valid

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Password | Department of Energy 5: OpenLDAP back-ndb Lets Remote Users Authenticate Without a Valid Password T-575: OpenLDAP back-ndb Lets Remote Users Authenticate Without a Valid Password March 11, 2011 - 3:05pm Addthis PROBLEM: A vulnerability was reported in OpenLDAP. A remote user can authenticate without a valid password. PLATFORM: Open LDAP version(s) 2.4.12 - 2.2.24 ABSTRACT: OpenLDAP back-ndb Lets Remote Users Authenticate Without a Valid Password. reference LINKS: SecurityTracker

  15. U-049: IBM Tivoli Netcool Reporter CGI Bug Lets Remote Users Inject

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Commands on the Target System | Department of Energy 49: IBM Tivoli Netcool Reporter CGI Bug Lets Remote Users Inject Commands on the Target System U-049: IBM Tivoli Netcool Reporter CGI Bug Lets Remote Users Inject Commands on the Target System December 1, 2011 - 9:00am Addthis PROBLEM: IBM Tivoli Netcool Reporter CGI Bug Lets Remote Users Inject Commands on the Target System. PLATFORM: IBM Tivoli Netcool Reporter prior to 2.2.0.8 ABSTRACT: A vulnerability was reported in IBM Tivoli Netcool

  16. MicroRNAs let-7b/i suppress human glioma cell invasion and migration by targeting IKBKE directly

    SciTech Connect (OSTI)

    Tian, Yuan; Hao, Shaobo; Ye, Minhua; Zhang, Anling; Nan, Yang; Wang, Guangxiu; Jia, Zhifan; Yu, Kai; Guo, Lianmei; Pu, Peiyu; Huang, Qiang; Zhong, Yue

    2015-03-06

    We demonstrated that IKBKE is overexpressed in human gliomas and that the downregulation of IKBKE markedly inhibits the proliferative and invasive abilities of glioma cells, which is consistent with the results reported by several different research groups. Therefore, IKBKE represents a promising therapeutic target for the treatment of glioma. In the present study, we verified that the microRNAs let-7b and let-7i target IKBKE through luciferase assays and found that let-7b/i mimics can knock down IKBKE and upregulate E-cadherin through western blot analysis. Moreover, the expression levels of let-7b/i were significantly lower in glioma cell lines than that in normal brain tissues, as determined by quantitative real-time PCR. Furthermore, let-7b/i inhibit the invasion and migration of glioma cells, as determined through wound healing and Transwell assays. The above-mentioned data suggest that let-7b/i inhibit the invasive ability of glioma cells by directly downregulating IKBKE and indirectly upregulating E-cadherin. - Highlights: • Let-7b and let-7i are downregulated in glioma cell lines. • IKBKE is a target gene of let-7b/i. • Let-7b/i inhibit the invasion and migration of glioma cells. • Let-7b/i upregulate E-cadherin by downregulating IKBKE.

  17. U-068:Linux Kernel SG_IO ioctl Bug Lets Local Users Gain Elevated...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Linux Kernel SGIO ioctl Bug Lets Local Users Gain Elevated Privileges PLATFORM: Red Hat Enterprise Linux Desktop (v. 6) Red Hat Enterprise Linux HPC Node (v. 6) Red Hat...

  18. T-563: Red Hat Directory Server Bugs Let Local Users Gain Elevated...

    Broader source: Energy.gov (indexed) [DOE]

    server and command line utilities for server administration. Addthis Related Articles T-671: Red Hat system-config-firewall Lets Local Users Gain Root Privileges V-041: Red Hat...

  19. V-183: Cisco TelePresence TC and TE Bugs Let Remote Users Deny...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Remote Users Deny Service and Remote Adjacent Authenticated Users Gain Root Shell Access V-183: Cisco TelePresence TC and TE Bugs Let Remote Users Deny Service and Remote Adjacent...

  20. T-575: OpenLDAP back-ndb Lets Remote Users Authenticate Without...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Remote Users Authenticate Without a Valid Password T-575: OpenLDAP back-ndb Lets Remote Users Authenticate Without a Valid Password March 11, 2011 - 3:05pm Addthis PROBLEM: A ...

  1. V-109: Google Chrome WebKit Type Confusion Error Lets Remote...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Google Chrome WebKit Type Confusion Error Lets Remote Users Execute Arbitrary Code PLATFORM: Google Chrome prior to 25.0.1364.160 ABSTRACT: A vulnerability was reported in...

  2. V-076: Cisco Wireless LAN Controller Bugs Let Remote Users Deny Service and

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Remote Authenticated Users Modify the Configuration and Execute Arbitrary Code | Department of Energy 6: Cisco Wireless LAN Controller Bugs Let Remote Users Deny Service and Remote Authenticated Users Modify the Configuration and Execute Arbitrary Code V-076: Cisco Wireless LAN Controller Bugs Let Remote Users Deny Service and Remote Authenticated Users Modify the Configuration and Execute Arbitrary Code January 24, 2013 - 6:00am Addthis PROBLEM: Several vulnerabilities were reported in

  3. Let's Try That Again: Selling the Teapot Dome Oil Field | Department of

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Energy Let's Try That Again: Selling the Teapot Dome Oil Field Let's Try That Again: Selling the Teapot Dome Oil Field January 30, 2015 - 11:28am Addthis A solitary oil pump at the Teapot Dome Oilfield in Wyoming. | Department of Energy photo. A solitary oil pump at the Teapot Dome Oilfield in Wyoming. | Department of Energy photo. Allison Lantero Allison Lantero Digital Content Specialist, Office of Public Affairs In 1922, President Warren Harding's Interior Secretary Albert Fall found

  4. V-235: Cisco Mobility Services Engine Configuration Error Lets Remote Users

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Login Anonymously | Department of Energy 5: Cisco Mobility Services Engine Configuration Error Lets Remote Users Login Anonymously V-235: Cisco Mobility Services Engine Configuration Error Lets Remote Users Login Anonymously September 5, 2013 - 12:33am Addthis PROBLEM: A vulnerability was reported in Cisco Mobility Services Engine. A remote user can login anonymously. PLATFORM: Cisco Mobility Services Engine ABSTRACT: A vulnerability in Cisco Mobility Services Engine could allow an

  5. Electromagnetic methods for measuring materials properties of cylindrical rods and array probes for rapid flaw inspection

    SciTech Connect (OSTI)

    Sun, Haiyan

    2005-05-01

    field in the presence of a finite a two-layer rod and a conductive tube. The results are in very good agreement with those obtained by using a 2D finite element code. In the third part, a new probe technology with enhanced flaw detection capability is described. The new probe can reduce inspection time through the use of multiple Hall sensors. A prototype Hall array probe has been built and tested with eight individual Hall sensor ICs and a racetrack coil. Electronic hardware was developed to interface the probes to an oscilloscope or an eddy current instrument. To achieve high spatial resolution and to limit the overall probe size, high-sensitivity Hall sensor arrays were fabricated directly on a wafer using photolithographic techniques and then mounted in their unencapsulated form. The electronic hardware was then updated to interface the new probes to a laptop computer.

  6. V-228: RealPlayer Buffer Overflow and Memory Corruption Error Let Remote

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Users Execute Arbitrary Code | Department of Energy 8: RealPlayer Buffer Overflow and Memory Corruption Error Let Remote Users Execute Arbitrary Code V-228: RealPlayer Buffer Overflow and Memory Corruption Error Let Remote Users Execute Arbitrary Code August 27, 2013 - 6:00am Addthis PROBLEM: Two vulnerabilities were reported in RealPlayer PLATFORM: RealPlayer 16.0.2.32 and prior ABSTRACT: A remote user can cause arbitrary code to be executed on the target user's system REFERENCE LINKS:

  7. T-692: VMware vFabric tc Server Lets Remote Users Login Using Obfuscated

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Passwords | Department of Energy 92: VMware vFabric tc Server Lets Remote Users Login Using Obfuscated Passwords T-692: VMware vFabric tc Server Lets Remote Users Login Using Obfuscated Passwords August 12, 2011 - 3:47pm Addthis PROBLEM: A vulnerability was reported in VMware vFabric tc Server. A remote user can login using an obfuscated version of their password. PLATFORM: Version(s): vFabric tc Server 2.0.0.RELEASE to 2.0.5.SR01, 2.1.0.RELEASE to 2.1.1.SR01 ABSTRACT: VMware vFabric tc

  8. U-091: cURL Lets Remote Users Decrypt SSL/TLS Traffic | Department of

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Energy 91: cURL Lets Remote Users Decrypt SSL/TLS Traffic U-091: cURL Lets Remote Users Decrypt SSL/TLS Traffic January 30, 2012 - 6:45am Addthis PROBLEM: A vulnerability was reported in cURL. PLATFORM: Linux (Any), UNIX (Any), Windows (Any) : Version(s): 7.10.6 through 7.23.1 ABSTRACT: A remote user can decrypt SSL/TLS sessions in certain cases. reference LINKS: CVE-2011-3389 SecurityTracker Alert ID: 1026587 Vendor Advisory IMPACT ASSESSMENT: Moderate Discussion: A remote user with the

  9. Effects of estrogen and gender on cataractogenesis induced by high-LET radiation

    SciTech Connect (OSTI)

    Henderson, M.A.; Rusek, A.; Valluri, S.; Garrett, J.; Lopez, J.; Caperell-Grant, A.; Mendonca, M.; Bigsby, R.; Dynlacht, J.

    2010-02-01

    Planning for long-duration manned lunar and interplanetary missions requires an understanding of radiation-induced cataractogenesis. Previously, it was demonstrated that low-linear energy transfer (LET) irradiation with 10 Gy of {sup 60}Co {gamma} rays resulted in an increased incidence of cataracts in male rats compared to female rats. This gender difference was not due to differences in estrogen, since male rats treated with the major secreted estrogen 17-{beta}-estradiol (E2) showed an identical increase compared to untreated males. We now compare the incidence and rate of progression of cataracts induced by high-LET radiation in male and female Sprague-Dawley rats. Rats received a single dose of 1 Gy of 600 MeV {sup 56}Fe ions. Lens opacification was measured at 2-4 week intervals with a slit lamp. The incidence and rate of progression of radiation-induced cataracts was significantly increased in the animals in which estrogen was available from endogenous or exogenous sources. Male rats with E2 capsules implanted had significantly higher rates of progression compared to male rats with empty capsules implanted (P = 0.025) but not compared to the intact female rats. These results contrast with data obtained after low-LET irradiation and suggest the possibility that the different types of damage caused by high- and low-LET radiation may be influenced differentially by steroid sex hormones.

  10. SU-E-T-555: A Protontherapy Inverse Treatment Planning System Prototype with Linear Energy Transfer (LET) Optimization

    SciTech Connect (OSTI)

    Sanchez-Parcerisa, D; Carabe-Fernandez, A

    2014-06-01

    Purpose: Develop and benchmark an inverse treatment planning system (TPS) for proton radiotherapy integrating fast analytical dose and LET calculations in patient geometries and a dual objective function with both dose and LET components, enabling us to apply optimization techniques to improve the predicted outcome of treatments based on radiobiological models. Methods: The software package was developed in MATLAB and implements a fluence-dose calculation technique based on a pencil beam model for dose calculations and a 3D LET model based on the extension of the LET in the radial direction as a function of the predicted radiological pathway. Both models were benchmarked against commissioning data from our institution, dose calculations performed with a commercial treatment planning system and Monte Carlo simulations. The optimization is based on the adaptive simulated annealing approach . Results: The dose and LET calculations were tested in a water phantom and several real patient treatments. The pass rate for the gamma index analysis (3%/3mm) test was above 90% for all test cases analyzed, and the calculation time was of the order of seconds. The inverse planning module produced plans with a significantly higher mean LET in the target compared to traditional plans, without any loss of target coverage. The clinical relevance of this improvement is under consideration . Conclusion: The developed treatment planning system is a valuable clinical and research tool that enables us to incorporate LET effects into proton radiotherapy planning in a streamlined fashion.

  11. V-106: Citrix Access Gateway Unspecified Security Bypass Vulnerability

    Broader source: Energy.gov [DOE]

    A vulnerability has been reported in Citrix Access Gateway, which can be exploited by malicious people to bypass certain security restrictions.

  12. U-013: HP Data Protector Multiple Unspecified Vulnerabilities

    Broader source: Energy.gov [DOE]

    Multiple vulnerabilities were reported in HP Data Protector. A remote user can execute arbitrary code on the target system.

  13. Research Highlight: Let the Good Times Flow - Joint Center for Energy

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Storage Research October 1, 2015, News Articles Research Highlight: Let the Good Times Flow There are two electrodes in every battery. One electrode, called the cathode, connects to the positive end of the battery and is where the electric current leaves the battery. The other electrode, the anode, connects to the negative end of the battery and is where the electric current enters the battery. The flow of these electrons through an external circuit is what produces the electric current.

  14. Spotlight on Austin, Texas: Let Your Contractor Be Your Guide for Big Rewards

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    1 Spotlight on Austin, Texas: Let Your Contractor Be Your Guide for Big Rewards Workforce All About Contractors Austin Energy, a municipally owned utility, has a long history of collaborating closely with the building contractors in its area to deliver energy efficiency programs, which benefits both parties involved. Because contractors understand that Austin Energy has made a long-term commitment to supporting energy efficiency, they have been willing to invest time and money into the technical

  15. Electrophoretically active sol-gel processes to backfill, seal, and/or densify porous, flawed, and/or cracked coatings on electrically conductive material

    DOE Patents [OSTI]

    Panitz, J.K.; Reed, S.T.; Ashley, C.S.; Neiser, R.A.; Moffatt, W.C.

    1999-07-20

    Electrophoretically active sol-gel processes to fill, seal, and/or density porous, flawed, and/or cracked coatings on electrically conductive substrates. Such coatings may be dielectrics, ceramics, or semiconductors and, by the present invention, may have deposited onto and into them sol-gel ceramic precursor compounds which are subsequently converted to sol-gel ceramics to yield composite materials with various tailored properties. 6 figs.

  16. Electrophoretically active sol-gel processes to backfill, seal, and/or densify porous, flawed, and/or cracked coatings on electrically conductive material

    DOE Patents [OSTI]

    Panitz, Janda K.; Reed, Scott T.; Ashley, Carol S.; Neiser, Richard A.; Moffatt, William C.

    1999-01-01

    Electrophoretically active sol-gel processes to fill, seal, and/or density porous, flawed, and/or cracked coatings on electrically conductive substrates. Such coatings may be dielectrics, ceramics, or semiconductors and, by the present invention, may have deposited onto and into them sol-gel ceramic precursor compounds which are subsequently converted to sol-gel ceramics to yield composite materials with various tailored properties.

  17. Final Assessment of Manual Ultrasonic Examinations Applied to Detect Flaws in Primary System Dissimilar Metal Welds at North Anna Power Station

    SciTech Connect (OSTI)

    Anderson, Michael T.; Diaz, Aaron A.; Cinson, Anthony D.; Crawford, Susan L.; Prowant, Matthew S.; Doctor, Steven R.

    2014-03-24

    PNNL conducted a technical assessment of the NDE issues and protocols that led to missed detections of several axially oriented flaws in a steam generator primary inlet dissimilar metal weld at North Anna Power Station, Unit 1 (NAPS-1). This particular component design exhibits a significant outside-diameter (OD) taper that is not included as a blind performance demonstration mock-up within the industry’s Performance Demonstration Initiative, administered by EPRI. For this reason, the licensee engaged EPRI to assist in the development of a technical justification to support the basis for a site-specific qualification. The service-induced flaws at NAPS-1 were eventually detected as a result of OD surface machining in preparation for a full structural weld overlay. The machining operation uncovered the existence of two through-wall flaws, based on the observance of primary water leaking from the dissimilar metal weld. A total of five axially oriented flaws were detected in varied locations around the weld circumference. The field volumetric examination that was conducted at NAPS-1 was a non-encoded, real-time manual ultrasonic examination. PNNL conducted both an initial assessment, and subsequently, a more rigorous technical evaluation (reported here), which has identified an array of NDE issues that may have led to the subject missed detections. These evaluations were performed through technical reviews and discussions with NRC staff, EPRI NDE Center personnel, industry and ISI vendor personnel, and ultrasonic transducer manufacturers, and laboratory tests, to better understand the underlying issues at North Anna.

  18. A FRAMEWORK TO DEVELOP FLAW ACCEPTANCE CRITERIA FOR STRUCTURAL INTEGRITY ASSESSMENT OF MULTIPURPOSE CANISTERS FOR EXTENDED STORAGE OF USED NUCLEAR FUEL

    SciTech Connect (OSTI)

    Lam, P.; Sindelar, R.; Duncan, A.; Adams, T.

    2014-04-07

    A multipurpose canister (MPC) made of austenitic stainless steel is loaded with used nuclear fuel assemblies and is part of the transfer cask system to move the fuel from the spent fuel pool to prepare for storage, and is part of the storage cask system for on-site dry storage. This weld-sealed canister is also expected to be part of the transportation package following storage. The canister may be subject to service-induced degradation especially if exposed to aggressive environments during possible very long-term storage period if the permanent repository is yet to be identified and readied. Stress corrosion cracking may be initiated on the canister surface in the welds or in the heat affected zone because the construction of MPC does not require heat treatment for stress relief. An acceptance criteria methodology is being developed for flaw disposition should the crack-like defects be detected by periodic Inservice Inspection. The external loading cases include thermal accident scenarios and cask drop conditions with the contribution from the welding residual stresses. The determination of acceptable flaw size is based on the procedure to evaluate flaw stability provided by American Petroleum Institute (API) 579 Fitness-for-Service (Second Edition). The material mechanical and fracture properties for base and weld metals and the stress analysis results are obtained from the open literature such as NUREG-1864. Subcritical crack growth from stress corrosion cracking (SCC), and its impact on inspection intervals and acceptance criteria, is not addressed.

  19. SU-E-T-581: On the Value of LET as a Radiation Quality Descriptor for RBE

    SciTech Connect (OSTI)

    Pater, P; Backstrom, G; Enger, S; Seuntjens, J; Naqa, I El; Villegas, F; Ahnesjo, A

    2015-06-15

    Purpose: To investigate the relationship between linear energy transfer (LET) and relative biological effectiveness (RBE) for protons and light ions, and the corresponding role of LET as a descriptor of radiation quality of hadron therapy. Methods: Monte Carlo (MC) proton and light ion (He, Li, C) tracks with LET < 30 eV nm{sup -1} were generated in an event-by-event mode. They were overlaid on a cell nucleus model containing 6×10{sup 9} nucleotide base pairs using an isotropic irradiation procedure that provides electronic equilibrium. Strand breaks (sbs) were scored in the DNA sugar-phosphate groups and further sub-classified into single or double sbs (ssbs or dsbs). Distributions of ssbs and dsbs for 2 Gy fractions were calculated to estimate RBE for the induction of initial dsbs with reference to {sup 60}Co. Additionally, sbs were classified based on their complexity (i.e. the number of sbs in each cluster). Results: An increase in LET for light ions of the same atomic number or a decrease in atomic number for ions of the same LET resulted in a lower kinetic energy of emitted secondary electrons. The clustering of DNA damage was more pronounced as reflected by the increase in proton RBE from ∼ 1.75 to 4 for LET values of 7 to 28 eV nm{sup -1}. A significant RBE decrease between protons, He, Li and C ions of the same LET was also noticed as function of the atomic number. Significant differences in ssbs and dsbs complexities were also seen for particles with the same LET, potentially supporting a clustering-based radiation quality descriptor. Conclusion: The LET-RBE relationships were simulated for proton and light ions and exhibited expected trends, including different RBEs for particles with the same LET but different atomic numbers. A complexity based radiation quality descriptor may allow better differentiation of RBE between radiation fields of similar LET. We would like to acknowledge support from the Fonds de recherche du Quebec Sante (FRQS), from the

  20. V-058: Microsoft Internet Explorer CDwnBindInfo Object Reuse...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    8: Microsoft Internet Explorer CDwnBindInfo Object Reuse Flaw Lets Remote Users Execute Arbitrary Code V-058: Microsoft Internet Explorer CDwnBindInfo Object Reuse Flaw Lets Remote...

  1. V-012: Mozilla Firefox 'window.location' Bugs Permit Cross-Site Scripting Attacks and May Let Remote Users Execute Arbitrary Code

    Broader source: Energy.gov [DOE]

    PROBLEM: Mozilla Firefox 'window.location' Bugs Permit Cross-Site Scripting Attacks and May Let Remote Users Execute Arbitrary Code

  2. Shallow Flaws Under Biaxial Loading Conditions, Part II: Application of a Weibull Stress Analysis of the Cruciform Bend Specimen Using a Hydrostatic Stress Criterion

    SciTech Connect (OSTI)

    Bass, B.R.; McAfee, W.J.; Williams, P.T.

    1999-08-01

    Cruciform beam fracture mechanics specimensl have been developed in the Heavy Section Steel Technology (HSST) Program at Oak Ridge National Laboratory (ORNL) to introduce a prototypic, far- field, out-of-plane biaxird bending stress component in the test section that approximates the nonlinear biaxial stresses resulting from pressurized-thernxd-shock or pressure-temperature loading of a nuclear reactor pressure vessel (RPV). Matrices of cruciform beam tests were developed to investigate and quantify the effects of temperature, biaxial loading, and specimen size on fracture initiation toughness of two-dimensional (constant depth), shtdlow, surface flaws. Tests were conducted under biaxial load ratios ranging from uniaxial to equibiaxial. These tests demonstrated that biaxial loading can have a pronounced effect on shallow-flaw fracture toughness in the lower transition temperature region for RPV materials. Two and three- parameter Weibull models have been calibrated using a new scheme (developed at the University of Illinois) that maps toughness data from test specimens with distinctly different levels of crack-tip constraint to a small scale yielding (SSY) Weibull stress space. These models, using the new hydrostatic stress criterion in place of the more commonly used maximum principal stress in the kernel of the OW integral definition, have been shown to correlate the experimentally observed biaxiaI effect in cruciform specimens, thereby providing a scaling mechanism between uniaxial and biaxial loading states.

  3. Fatal Flaw Analysis of Utility-Scale Wind Turbine Generators at the West Haymarket Joint Public Agency. A Study Prepared in Partnership with the Environmental Protection Agency for the RE-Powering America's Land Initiative: Siting Renewable Energy on Potentially Contaminated Land and Mine Sites

    SciTech Connect (OSTI)

    Roberts, J. O.; Mosey, G.

    2013-08-01

    Fatal flaw analysis of utility-scale wind turbines at the West Haymarket Joint Public Agency brownfields site in Lincoln, Nebraska, funded by EPA.

  4. SU-E-T-354: Peak Temperature Ratio of TLD Glow Curves to Investigate the Spatial Dependence of LET in a Clinical Proton Beam

    SciTech Connect (OSTI)

    Reft, C [UniversityChicago, Chicago, IL (United States); Pankuch, M; Ramirez, H [ProCure Treatment Centers, Warrenville, IL (United States)

    2014-06-01

    Purpose: Use the ratio of the two high temperature peaks (HTR) in TLD 700 glow curves to investigate spatial dependence of the linear energy transfer (LET) in proton beams. Studies show that the relative biological effectiveness (RBE) depends upon the physical dose as well as its spatial distribution. Although proton therapy uses a spatially invariant RBE of 1.1, studies suggest that the RBE increases in the distal edge of a spread out Bragg peak (SOBP) due to the increased LET. Methods: Glow curve studies in TLD 700 show that the 280 C temperature peak is more sensitive to LET radiation than the 210 C temperature peak. Therefore, the areas under the individual temperature peaks for TLDs irradiated in a proton beam normalized to the peak ratio for 6 MV photons are used to determine the HTR to obtain information on its LET. TLD 700 chips with dimensions 0.310.310.038 cc are irradiated with 90 MeV protons at varying depths in a specially designed blue wax phantom to investigate LET spatial dependence. Results: Five TLDs were placed at five different depths of the percent depth dose curve (PDD) of range 16.2 cm: center of the SOPB and approximately at the 99% distal edge, 90%, 75% and 25% of the PDD, respectively. HTR was 1.3 at the center of the SOBP and varied from 2.2 to 3.9 which can be related to an LET variation from 0.5 to 18 KeV/? via calibration with radiation beams of varying LET. Conclusion: HTR data show a spatially invariant LET slightly greater than the 6 MV radiations in the SOBP, but a rapidly increasing LET at the end of the proton range. These results indicate a spatial variation in RBE with potential treatment consequences when selecting treatment margins to minimize the uncertainties in proton RBE.

  5. MOLECULAR MECHANISM OF SUPPRESSION OF NEOPLASTIC TRANSFORMATION BY LOW DOSES OF LOW LET RADIATION

    SciTech Connect (OSTI)

    J.LESIE REDPATH, PH.D.

    2011-03-29

    We are currently funded (9/01-8/04) by the DOE Low Dose Radiation Research Program to examine mechanisms underlying the suppression of neoplastic transformation in vitro by low doses of low LET radiation. For the new studies proposed under Notice 04-21, we intend to follow up on our observation that upregulation of DNA repair may be an important factor and that its importance is dose-dependent. The experimental system will be the human hybrid cell neoplastic transformation assay that we are currently using. We propose to test the following hypothesis: Down-regulation of DNA dsb repair will abrogate the low dose suppression of neoplastic transformation. Using the technique of RNA silencing, it is proposed to test the effect of down-regulation of the two major DNA dsb repair pathways, homologous recombination (HR) and non-homologous end-joining (NHEJ), on the dose response relationship for neoplastic transformation. Based on prior studies, we predict that this will result in abrogation of the suppressive effect at doses in the range 1 to 10 cGy, but not at lower doses. The proposed experiments will also help address the question as to which of the two DNA repair pathways may be the most important in causing suppression of transformation. HR is a pathway that is predominant in S and G2 phase cells and is known to be less error-prone than the NHEJ pathway that is predominant in G1 phase. We hypothesize that down-regulation of HR will result in the most effective abrogation of suppression. An important component of this study will be the determination of the how abrogation of DNA dsb repair impacts the spontaneous transformation frequency, presumably a consequence of endogeneous DNA damage. Experiments will be carried out using partially synchronized populations of cells enriched for G1 and S/G2 respectively. In addition to the endpoint of neoplastic transformation the impact of down-regulation of HR and NHEJ on the formation and disappearance of the DNA dsb marker

  6. In-service Inspection Ultrasonic Testing of Reactor Pressure Vessel Welds for Assessing Flaw Density and Size Distribution per 10 CFR 50.61a, Alternate Fracture Toughness Requirements

    SciTech Connect (OSTI)

    Sullivan, Edmund J.; Anderson, Michael T.; Norris, Wallace

    2012-09-17

    Pressurized thermal shock (PTS) events are system transients in a pressurized water reactor (PWR) in which there is a rapid operating temperature cool-down that results in cold vessel temperatures with or without repressurization of the vessel. The rapid cooling of the inside surface of the reactor pressure vessel (RPV) causes thermal stresses that can combine with stresses caused by high pressure. The aggregate effect of these stresses is an increase in the potential for fracture if a pre-existing flaw is present in a material susceptible to brittle failure. The ferritic, low alloy steel of the reactor vessel beltline adjacent to the core, where neutron radiation gradually embrittles the material over the lifetime of the plant, can be susceptible to brittle fracture. The PTS rule, described in the Code of Federal Regulations, Title 10, Section 50.61 (§50.61), “Fracture Toughness Requirements for Protection against Pressurized Thermal Shock Events,” adopted on July 23, 1985, establishes screening criteria to ensure that the potential for a reactor vessel to fail due to a PTS event is deemed to be acceptably low. The U.S. Nuclear Regulatory Commission (NRC) completed a research program that concluded that the risk of through-wall cracking due to a PTS event is much lower than previously estimated. The NRC subsequently developed a rule, §50.61a, published on January 4, 2010, entitled “Alternate Fracture Toughness Requirements for Protection Against Pressurized Thermal Shock Events” (75 FR 13). Use of the new rule by licensees is optional. The §50.61a rule differs from §50.61 in that it requires licensees who choose to follow this alternate method to analyze the results from periodic volumetric examinations required by the ASME Code, Section XI, Rules for Inservice Inspection (ISI) of Nuclear Power Plants. These analyses are intended to determine if the actual flaw density and size distribution in the licensee’s reactor vessel beltline welds are bounded

  7. TASK PLAN: Tribal Issues Topic Group

    Office of Environmental Management (EM)

    Security Controls | Department of Energy 6: Cisco ASA Multiple Flaws Let Remote Users Deny Service and Bypass Security Controls T-536: Cisco ASA Multiple Flaws Let Remote Users Deny Service and Bypass Security Controls January 18, 2011 - 2:30pm Addthis PROBLEM: Cisco ASA Multiple Flaws Let Remote Users Deny Service and Bypass Security Controls. PLATFORM: Cisco 5500 Series Adaptive Security Appliances (ASA) ABSTRACT: Cisco ASA 5500 Series Adaptive Security Appliances are affected by multiple

  8. V-120: EMC Smarts Network Configuration Manager Java RMI Access...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    0: EMC Smarts Network Configuration Manager Java RMI Access Control Flaw Lets Remote Users Gain Full Control V-120: EMC Smarts Network Configuration Manager Java RMI Access Control...

  9. U-154: IBM Rational ClearQuest ActiveX Control Buffer Overflow...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    V-020: Apple QuickTime Multiple Flaws Let Remote Users Execute Arbitrary Code U-126: Cisco Adaptive Security Appliances Port Forwarder ActiveX Control Buffer Overflow ...

  10. T-678: Red Hat Enterprise Virtualization Hypervisor VLAN Packet...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    8: Red Hat Enterprise Virtualization Hypervisor VLAN Packet Processing Flaw Lets Remote Users Deny Service T-678: Red Hat Enterprise Virtualization Hypervisor VLAN Packet...

  11. JC3 Bulletin Archive | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    a critical vulnerability that allows for remote code execution June 12, 2013 V-176: Adobe Flash Player Memory Corruption Flaw Lets Remote Users Execute Arbitrary Code A...

  12. JC3 | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    a critical vulnerability that allows for remote code execution June 12, 2013 V-176: Adobe Flash Player Memory Corruption Flaw Lets Remote Users Execute Arbitrary Code A...

  13. U-021: Cisco Unified Communications Manager Directory Traversal...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Unified Communications Manager Directory Traversal Flaw Lets Remote Users Obtain Files. PLATFORM: Cisco Unified Communications Manager 6.x, 7.x and 8.x ABSTRACT: A vulnerability...

  14. T-643: HP OpenView Storage Data Protector Unspecified Code Execution Vulnerability

    Broader source: Energy.gov [DOE]

    A vulnerability has been reported in HP OpenView Storage Data Protector, which can be exploited by malicious people to compromise a vulnerable system.

  15. U-188: MySQL User Login Security Bypass and Unspecified Vulnerability

    Office of Energy Efficiency and Renewable Energy (EERE)

    An error when verifying authentication attempts can be exploited to bypass the authentication mechanism.

  16. V-148: Novell iPrint Client Unspecified Buffer Overflow Vulnerability

    Broader source: Energy.gov [DOE]

    A vulnerability has been reported in Novell iPrint Client, which can be exploited by malicious people to compromise a user's system

  17. Oxidative Stress and Skeletal Health with Low-Dose, Low-LET (Linear Energy Transfer) Ionizing Radiation

    SciTech Connect (OSTI)

    Globus, Ruth K.

    2014-11-03

    We performed in vivo and in vitro experiments to accomplish the following specific aims of this project: 1) determine if low dose, low LET radiation affects skeletal remodeling at structural, cellular and molecular levels and 2) determine if low dose, low LET radiation modulates skeletal health during aging via oxidative mechanisms. A third aim is supported by NASA supplement to this DOE grant focusing on the influence of high LET radiation on bone. A series of experiments were conducted at the NASA Space Radiation Laboratory at Brookhaven, NSRL-BNL, using iron (56Fe) or a sequential exposure to protons / iron / protons, and separate experiments at NASA Ames Research Center (ARC) using 137Cs. The following provides a summary of key findings. (1) Exposure of nine-week old female mice to priming doses of gamma radiation (10cGy x 5) did not significantly affect bone volume/total volume (BV/TV) or microarchitecture as analyzed by 3D microcomputed tomography. As expected, exposure to the challenge dose of 2 Gy gamma irradiation resulted in significant decreases in BV/TV. The priming dose combined with the 2Gy challenge dose had no further effect on BV/TV compared to challenge dose alone, with the sole exception of the Structural Model Index (SMI). SMI reflects the ratio of rods-to-plates in cancellous bone tissue, such that higher SMI values indicate a tendency toward a weaker structure compared to lower SMI values. Mice treated with both priming and challenge dose had 25% higher SMI values compared to sham-irradiated controls and 7% higher values compared to mice treated with the challenge dose alone. Thus, although this priming regimen had relatively modest effects on cancellous tissue, the difference in SMI suggests this fractionated priming doses have adverse, rather than beneficial, effects on bone structure. (2) In 10-week old male mice, a single exposure to 100cGy of 137Cs reduces trabecular bone number and connectivity density by 20% and 36% respectively one

  18. Evaluation on the Feasibility of Using Ultrasonic Testing of Reactor Pressure Vessel Welds for Assessing Flaw Density/Distribution per 10 CFR 50.61a, Alternate Fracture Toughness Requirements for Protection Against Pressurized Thermal Shock

    SciTech Connect (OSTI)

    Sullivan, Edmund J.; Anderson, Michael T.

    2014-06-10

    This technical letter report provides the status of an assessment undertaken by PNNL at the request of the NRC to verify the capability of periodic ASME-required volumetric examinations of reactor vessels to characterize the density and distribution of flaws of interest for applying §50.61a on a plant-by-plant basis. The PTS rule, described in the Code of Federal Regulations, Title 10, Section 50.61 (§50.61), "Fracture Toughness Requirements for Protection against Pressurized Thermal Shock Events," establishes screening criteria to ensure that the potential for a reactor vessel to fail due to a PTS event is deemed to be acceptably low. Recently, the NRC completed a research program that concluded that the risk of through-wall cracking due to a PTS event is much lower than previously estimated. The NRC subsequently developed and promulgated an alternate PTS rule, §50.61a, that can be implemented by PWR licensees. The §50.61a rule differs from §50.61 in that it requires licensees who choose to follow this alternate method to analyze the results from periodic volumetric examinations required by the ASME Code, Section XI, Rules for Inservice Inspection (ISI) of Nuclear Power Plants.

  19. Real-time Molecular Study of Bystander Effects of Low dose Low LET radiation Using Living Cell Imaging and Nanoparticale Optics

    SciTech Connect (OSTI)

    Natarajan, Mohan; Xu, Nancy R; Mohan, Sumathy

    2013-06-03

    In this study two novel approaches are proposed to investigate precisely the low dose low LET radiation damage and its effect on bystander cells in real time. First, a flow shear model system, which would provide us a near in vivo situation where endothelial cells in the presence of extra cellular matrix experiencing continuous flow shear stress, will be used. Endothelial cells on matri-gel (simulated extra cellular matrix) will be subjected to physiological flow shear (that occurs in normal blood vessels). Second, a unique tool (Single nano particle/single live cell/single molecule microscopy and spectroscopy; Figure A) will be used to track the molecular trafficking by single live cell imaging. Single molecule chemical microscopy allows one to single out and study rare events that otherwise might be lost in assembled average measurement, and monitor many target single molecules simultaneously in real-time. Multi color single novel metal nanoparticle probes allow one to prepare multicolor probes (Figure B) to monitor many single components (events) simultaneously and perform multi-complex analysis in real-time. These nano-particles resist to photo bleaching and hence serve as probes for unlimited timeframe of analysis. Single live cell microscopy allows one to image many single cells simultaneously in real-time. With the combination of these unique tools, we will be able to study under near-physiological conditions the cellular and sub-cellular responses (even subtle changes at one molecule level) to low and very low doses of low LET radiation in real time (milli-second or nano-second) at sub-10 nanometer spatial resolution. This would allow us to precisely identify, at least in part, the molecular mediators that are responsible of radiation damage in the irradiated cells and the mediators that are responsible for initiating the signaling in the neighboring cells. Endothelial cells subjected to flow shear (2 dynes/cm2 or 16 dynes/cm2) and exposed to 0.1, 1 and 10

  20. V-198: Red Hat Enterprise MRG Messaging Qpid Python Certificate...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    8: Red Hat Enterprise MRG Messaging Qpid Python Certificate Validation Flaw Lets Remote Users Conduct Man-in-the-Middle Attacks V-198: Red Hat Enterprise MRG Messaging Qpid Python...

  1. JC3 | Department of Energy

    Broader source: Energy.gov (indexed) [DOE]

    26, 2013 V-227: VMware Workstation and Player vmware-mount Command Flaw Lets Local Users Gain Root Privileges VMware Workstation and Player contain a vulnerability in the handling...

  2. Distant Observer Tool Quickly Identifies Costly Flaws in CSP...

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    control digital photography and metrology are combined to accurately define optical efficiency problems in concentrating solar power (CSP) plants. In a typical 100-megawatt (MW)...

  3. U-245: Critical Java 0-day flaw exploited

    Broader source: Energy.gov [DOE]

    Targeted attacks exploiting a zero-day Java vulnerability to deliver the Poison Ivy RAT onto the unsuspecting victims' machines

  4. High temperature ultrasonic testing of materials for internal flaws

    DOE Patents [OSTI]

    Kupperman, David S.; Linzer, Melvin

    1990-01-01

    An apparatus is disclosed for nondestructive evaluation of defects in hot terials, such as metals and ceramics, by sonic signals, which includes a zirconia buffer in contact with a hot material being tested, a liquid couplant of borax in contact with the zirconia buffer and the hot material to be tested, a transmitter mounted on the zirconia buffer sending sonic signals through the buffer and couplant into the hot material, and a receiver mounted on the zirconia buffer receiving sonic signals reflected from within the hot material through the couplant and the buffer.

  5. Method and apparatus for detecting flaws in conductive material

    DOE Patents [OSTI]

    Hockey, R.L.; Riechers, D.M.

    1998-07-07

    The present invention uses a magnet in relative motion to a conductive material, and a coil that is stationary with respect to the magnet to measure perturbation or variation in the magnetic field in the presence of an inclusion. The magnet and coil sensor may be on the same side of the conductive material. 18 figs.

  6. U-147:Red Hat Enterprise MRG Grid Input Validation Flaw

    Office of Energy Efficiency and Renewable Energy (EERE)

    The MRG Management Console (Cumin) does not properly filter HTML code from user-supplied input before displaying the input.

  7. U-175: Linux Kernel KVM Memory Slot Management Flaw

    Broader source: Energy.gov [DOE]

    A vulnerability was reported in the Linux Kernel. A local user on the guest operating system can cause denial of service conditions on the host operating system.

  8. Impedance sensing of flaws in non-homogenous materials

    DOE Patents [OSTI]

    Novak, James L.

    1997-01-01

    An apparatus and method for sensing impedances of materials placed in contact therewith. The invention comprises a plurality of drive electrodes and one or more sense electrodes. Both rotating electric fields and differently shaped electric fields are provided for, as are analysis of structure and composition at different orientations and depths.

  9. Impedance sensing of flaws in non-homogeneous materials

    DOE Patents [OSTI]

    Novak, J.L.

    1997-02-11

    An apparatus and method are disclosed for sensing impedances of materials placed in contact therewith. The invention comprises a plurality of drive electrodes and one or more sense electrodes. Both rotating electric fields and differently shaped electric fields are provided for, as are analysis of structure and composition at different orientations and depths. 10 figs.

  10. U-139: IBM Tivoli Directory Server Input Validation Flaw

    Broader source: Energy.gov [DOE]

    The Web Admin Tool does not properly filter HTML code from user-supplied input before displaying the input.

  11. Fatigue response of repaired thick aluminum panels with bondline flaws

    SciTech Connect (OSTI)

    Conley, D.S.

    1999-03-01

    This research investigated the fatigue response of precracked 558 x 177.8 x 6.35 mm (22.0 x 7.0 x 0.25 in) 2024-T351 aluminum panels repaired with single-sided partially bonded, unidirectional, eighteen ply boron/epoxy reinforcements. Disbonds were introduced into the bondline of each repair during the adhesion process using teflon inserts. Five different disbond configurations, with varying disbond locations and sizes, were tested. Each repaired panel was subjected to constant amplitude cyclic fatigue loading with a maximum stress of 120MPa. Results from the different configurations were compared against one another and against repaired panels with no debonds to assess the effect of disbonds on repair life. Results from the experimentation showed that even in the case of very large disbonds (20% of total bond area), the bonded repairs significantly extended the lives of the cracked panels. Disbond configurations with disbonds located away from the crack in the aluminum panel, performed comparably to the repaired panel with no disbonds. Disbond configurations with disbonds covering the crack in the aluminum panel yielded slightly lower lives than those obtained from repaired panels with no disbonds. Cyclic fatigue loading caused no increase in size of the artificially induced disbonds. Cyclic disbond growth was observed in the immediate vicinity of the crack. Finite element analysis using the Three Layer Technique was performed to assess the ability of current modeling techniques in predicting the life of cracked thick aluminum panels repaired with composite patches. Results from the finite element analysis were shown to very closely match experimental data.

  12. Method and apparatus for detecting flaws in conductive material

    DOE Patents [OSTI]

    Hockey, Ronald L.; Riechers, Douglas M.

    1998-01-01

    The present invention uses a magnet in relative motion to a conductive material, and a coil that is stationary with respect to the magnet to measure perturbation or variation in the magnetic field in the presence of an inclusion. The magnet and coil sensor may be on the same side of the conductive material.

  13. Let the private sector handle energy conservation

    SciTech Connect (OSTI)

    Bajer, E.R.

    1982-08-23

    Mr. Bajer feels that elimination of many federal conservation programs will have no effect on the US goal of reducing oil imports because the private sector can do a better job of providing these efforts. He notes that many government programs were the result of overreaction to the 1973 oil embargo, when Congress misread the public's willingness to respond. The American people have taken the initiative, however, and have reduced their energy consumption and import rates. Mr. Bajer further notes that, according to the DOE Office of Policy, Planning and Analysis, DOE's conservation programs accounted for less than 5% of reduction of energy use per unit of GNP. He thinks that new policies will allow market forces to continue providing conservation incentives and will remove government intervention and competition with the private sector. (DCK)

  14. U-212: RSA Authentication Manager Flaws Permit Cross-Site and...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Attackers can exploit these issues to execute arbitrary script or HTML code, steal cookie-based authentication credentials, and conduct phishing attacks. Other attacks may also be ...

  15. Validation of analysis methods for assessing flawed piping subjected to dynamic loading

    SciTech Connect (OSTI)

    Olson, R.J.; Wolterman, R.L.; Wilkowski, G.M.; Kot, C.A.

    1994-08-01

    Argonne National Laboratory and Battelle have jointly conducted a research program for the USNRC to evaluate the ability of current engineering analysis methods and one state-of-the-art analysis method to predict the behavior of circumferentially surface-cracked pipe system water-hammer experiment. The experimental data used in the evaluation were from the HDR Test Group E31 series conducted by the Kernforschungszentrum Karlsruhe (KfK) in Germany. The incentive for this evaluation was that simplified engineering methods, as well as newer ``state-of-the-art`` fracture analysis methods, have been typically validated only with static experimental data. Hence, these dynamic experiments were of high interest. High-rate dynamic loading can be classified as either repeating, e.g., seismic, or nonrepeating, e.g., water hammer. Development of experimental data and validation of cracked pipe analyses under seismic loading (repeating dynamic loads) are being pursued separately within the NRC`s International Piping Integrity Research Group (IPIRG) program. This report describes developmental and validation efforts to predict crack stability under water hammer loading, as well as comparisons using currently used analysis procedures. Current fracture analysis methods use the elastic stress analysis loads decoupled from the fracture mechanics analysis, while state-of-the-art methods employ nonlinear cracked-pipe time-history finite element analyses. The results showed that the current decoupled methods were conservative in their predictions, whereas the cracked pipe finite element analyses were more accurate, yet slightly conservative. The nonlinear time-history cracked-pipe finite element analyses conducted in this program were also attractive in that they were done on a small Apollo DN5500 workstation, whereas other cracked-pipe dynamic analyses conducted in Europe on the same experiments required the use of a CRAY2 supercomputer, and were less accurate.

  16. V-229: IBM Lotus iNotes Input Validation Flaws Permit Cross-Site...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    CVE-2013-0591 CVE-2013-0595 IMPACT ASSESSMENT: Medium DISCUSSION: The software does not properly filter HTML code from user-supplied input before displaying the input. ...

  17. Distant Observer Tool Quickly Identifies Costly Flaws in CSP Fields (Fact Sheet)

    SciTech Connect (OSTI)

    Not Available

    2012-12-01

    Remote control digital photography and metrology are combined to accurately define optical efficiency problems in concentrating solar power (CSP) plants.

  18. U-195: PHPlist Input Validation Flaws Permit Cross-Site Scripting and SQL Injection Attacks

    Broader source: Energy.gov [DOE]

    The 'public_html/lists/admin' pages do not properly validate user-supplied input in the 'sortby' parameter [CVE-2012-2740]. A remote authenticated administrative user can supply a specially crafted parameter value to execute SQL commands on the underlying database.

  19. V-153: Symantec Brightmail Gateway Input Validation Flaw Permits Cross-Site Scripting Attacks

    Broader source: Energy.gov [DOE]

    Symantec’s Brightmail Gateway management console is susceptible to stored cross-site scripting (XSS) issues found in some of the administrative interface pages.

  20. U-229: HP Network Node Manager i Input Validation Flaw Permits Cross-Site Scripting Attacks

    Broader source: Energy.gov [DOE]

    Potential security vulnerabilities have been identified with HP Network Node Manager i (NNMi) for HP-UX, Linux, Solaris, and Windows. The vulnerabilities could be remotely exploited resulting in cross site scripting (XSS).

  1. U-073: Bugzilla Flaws Permit Cross-Site Scripting and Cross-Site Request Forgery Attacks

    Broader source: Energy.gov [DOE]

    Several vulnerabilities were reported in Bugzilla. A remote user can conduct cross-site scripting attacks.

  2. A STRUCTURAL IMPACT ASSESSMENT OF FLAWS DETECTED DURING ULTRASONIC EXAMINATION OF TANK 15

    SciTech Connect (OSTI)

    Wiersma, B; James Elder, J

    2008-08-21

    Ultrasonic (UT) inspection of Tank 15 was conducted between April and July 2007 in accordance with the Tank 15 UT inspection plan. This was a planned re-inspection of this tank, the previous one was performed in 2002. Ten cracks were characterized in the previous examination. The re-inspection was performed to verify the present models and understanding for stress corrosion cracking. During this re-examination, one indication that was initially reported as a 'possible perpendicular crack <25% through wall' in 2002, was clearly shown not to be a crack. Additionally, examination of a new area immediately adjacent to other cracks along a vertical weld revealed three new cracks. It is not known when these new cracks formed as they could very well have been present in 2002 as well. Therefore, a total of twelve cracks were evaluated during the re-examination. A critical review of the information describing stress corrosion crack behavior for the SRS waste tanks, as well as a summary review of the service history of Tank 15, was performed. Each crack was then evaluated for service exposure history, consistency of the crack behavior with the current understanding of stress corrosion cracking, and present and future impact to the structural integrity of the tank. Crack instability calculations were performed on each crack for a bounding waste removal loading condition in Tank 15. In all cases, the crack behavior was determined to be consistent with the previous understanding of stress corrosion cracking in the SRS waste tank environment. The length of the cracks was limited due to the short-range nature of the residual stresses near seam, repair and attachment welds. Of the twelve cracks, nine were located in the vapor space above the sludge layer, including the three new cracks. Comparison of the crack lengths measured in 2002 and 2007 revealed that crack growth had occurred in four of the six previously measured vapor space cracks. However, the growth remained within the residual stress zone. None of the three cracks beneath the sludge showed evidence of growth. The impact of the cracks that grew on the future service of Tank 15 was also assessed. Tank 15 is expected to undergo closure activities including sludge waste removal. A bounding loading condition for waste removal of the sludge at the bottom of Tank 15 was considered for this analysis. The analysis showed that the combination of hydrostatic, seismic, pump and weld residual stresses are not expected to drive any of the cracks identified during the Tank 15 UT inspection to instability. Wall thickness mapping for general thinning and pitting was also performed. No significant wall thinning was observed. The average wall thickness values were well above nominal. Two isolated pit-like indications were observed. Both were approximately 30 mils deep. However, the remaining wall thickness was still greater than nominal specified for the original construction plate material. It was recommended that a third examination of selected cracks in Tank 15 be performed in 2014. This examination would provide information to determine whether any additional detectable degradation is occurring in Tank 15 and to supplement the basis for characterization of conditions that are non-aggressive to tank corrosion damage. The in-service inspection program is re-evaluated on a three year periodicity. The Type I and II tanks are not active receipt tanks at present, and are therefore not a part of the In-Service Inspection Program for the Type III Tanks [1]. Changes to the mission for Tank 15 and other Type I and II tanks may be considered by the In-Service Inspection Review Committee (ISIRC) and the program adjusted accordingly.

  3. Coiled tubing: Early warning system to detect flaws in flat sheet prior to rolling and welding

    SciTech Connect (OSTI)

    Edens, C.W. )

    1994-05-01

    Through experimentation and dynamic evaluation of skelp at a coiled tubing mill, the use of leakage flux solid state sensing devices shows clearly that the requirement for nondestructively testing skelp can be met. As coiled tubing for drilling purposes gains wider usage, its skelp can take advantage of upstream inspection prior to forming the tubes. A reliable coiled tubing product is one in which every aspect of its manufacturing was considered, from raw material through final inspection. In no other way can the concept of total quality management be satisfied providing reliability of product use. A guarantee of fitness for purpose falls directly on the coiled tubing manufacturer. Purveyors of jointed electronic resistance weld tubulars may also take advantage of this inspection method. The American Petroleum Institute (API) has recently established a committee to study and formulate recommended practices for coiled tubing operations.

  4. Ultrasonic Phased Array Technique for Accurate Flaw Sizing in Dissimilar Metal Welds

    SciTech Connect (OSTI)

    Jonathan D Buttram

    2005-03-11

    Described is a manual,portable non-destructive technique to determine the through wall height of cracks present in dissimilar metal welds used in the primary coolling systems of pressure water and boiler light water reactors. Current manual methods found in industry have proven not to exhibit the sizing accuracy required by ASME inspection requirement. The technique described demonstrated an accuracy approximately three times that required to ASME Section XI, Appendix 8 qualification.

  5. U-144:Juniper Secure Access Input Validation Flaw Permits Cross-Site Scripting Attacks

    Broader source: Energy.gov [DOE]

    The VPN management interface does not properly filter HTML code from user-supplied input before displaying the input. A remote user can cause arbitrary scripting code to be executed by the target user's browser.

  6. U-255: Apache Wicket Input Validation Flaw Permits Cross-Site...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    in ajax links before displaying the input. A remote user can create a specially crafted URL that, when loaded by a target user, will cause arbitrary scripting code to be executed...

  7. T-720: Blue Coat Director HTTP Trace Processing Flaw Permits Cross-Site Scripting Attacks

    Office of Energy Efficiency and Renewable Energy (EERE)

    A vulnerability was reported in Blue Coat Director. A remote user can conduct cross-site scripting attacks.

  8. U-050: Adobe Flex SDK Input Validation Flaw Permits Cross-Site Scripting Attacks

    Broader source: Energy.gov [DOE]

    Flex applications created using the Flex SDK may not properly filter HTML code from user-supplied input before displaying the input.

  9. Intense X-rays expose tiny flaws in 3-D printed titanium that...

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    ... Researchers theorized there would be a "sweet spot" at which they could set printing ... was a little bitter: there was no sweet spot for printing flawless Ti-6Al-4V. ...

  10. Going completely renewable: is it possible (let alone desirable)?

    SciTech Connect (OSTI)

    Sovacool, Benjamin K.; Watts, Charmaine

    2009-05-15

    With the right mix of leadership and policy, a completely renewable electricity sector for New Zealand and the United States is feasible, achievable, and desirable. (author)

  11. Solar Decathlon 2013: Let the Building Begin | Department of Energy

    Energy Savers [EERE]

    Managing Social Media Records Managing Social Media Records What is Social Media? Your Responsibilities As a DOE federal or contractor Employee your basic records obligations are to: Follow the Lifecycle Records Management Lifecycle Create or receive official records needed to do business Social Media, Web 2.0, and Gov 2 0 bring together technology obligations are to: Planning for the use of Social Media should address records management requirements. Create or Capture records A RECORD is a

  12. U-203: HP Photosmart Bug Lets Remote Users Deny Service

    Broader source: Energy.gov [DOE]

    A vulnerability was reported in HP Photosmart. A remote user can cause denial of service conditions.

  13. Let's Compare Tritium Design Practices Across The DOE Complex

    Broader source: Energy.gov [DOE]

    Presentation from the 32nd Tritium Focus Group Meeting held in Germantown, Maryland on April 23-25, 2013.

  14. U-084: Cisco Digital Media Manager Lets Remote Authenticated...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Show and Share. Impact: A remote authenticated user can send a specially crafted URL via TCP port 8443 to access administrative resources and gain administrative privileges....

  15. V-098: Linux Kernel Extended Verification Module Bug Lets Local...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    reported in the Linux Kernel. REFERENCE LINKS: The Linux Kernel Archives Linux Kernel Red Hat Bugzilla - Bug 913266 SecurityTracker Alert ID: 1028196 CVE-2013-0313 IMPACT...

  16. V-160: Wireshark Multiple Bugs Let Remote Users Deny Service...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    can be exploited to cause a crash via specially crafted packets. 6) An error in the MPEG DSM-CC dissector (dissectorspacket-mpeg-dsmcc.c) can be exploited to cause a crash via...

  17. V-103: RSA Authentication Agent Lets Remote Users Bypass Authenticatio...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    issued a fix (7.1.2). Addthis Related Articles U-267: RSA Authentication Agent 7.1 for Microsoft Windows and RSA Authentication Client 3.5 Access Control Vulnerability...

  18. Solar Decathlon 2013: Let the Building Begin | Department of...

    Broader source: Energy.gov (indexed) [DOE]

    Day 7 Construction During the 7th day of construction, the Solar Decathlon village has ... The University of North Carolina at Charlotte team members assemble their Solar Decathlon ...

  19. U-176: Wireshark Multiple Bugs Let Remote Users Deny Service

    Broader source: Energy.gov [DOE]

    Several vulnerabilities were reported in Wireshark. A remote user can cause denial of service conditions.

  20. Geothermal Literature Review | Open Energy Information

    Open Energy Info (EERE)

    Geothermal Literature Review (Smith, 1983) Unspecified A History Of Hot Dry Rock Geothermal Energy Systems Geothermal Literature Review (Wisian, Et Al., 2001) Unspecified...

  1. T-670: Skype Input Validation Flaw in 'mobile phone' Profile Entry Permits Cross-Site Scripting Attacks

    Broader source: Energy.gov [DOE]

    The software does not properly filter HTML code from user-supplied input in the The "mobile phone" profile entry before displaying the input.

  2. U-206: WordPress Flaws Permit Cross-Site Scripting, Cross-Site Request Forgery, and Information Disclosure Attacks

    Broader source: Energy.gov [DOE]

    Several vulnerabilities were reported in WordPress. A remote authenticated user can conduct cross-site scripting attacks. A remote user can conduct cross-site request forgery attacks. A remote authenticated user can obtain potentially sensitive information.

  3. V-112: Microsoft SharePoint Input Validation Flaws Permit Cross-Site Scripting and Denial of Service Attacks

    Broader source: Energy.gov [DOE]

    This security update resolves four reported vulnerabilities in Microsoft SharePoint and Microsoft SharePoint Foundation.

  4. T-649: Red Hat Network Satellite Server Request Validation Flaw Permits Cross-Site Request Forgery Attacks

    Broader source: Energy.gov [DOE]

    The Red Hat Network (RHN) Satellite and Spacewalk services do not properly validate user-supplied. A remote user can create specially crafted HTML that, when loaded by a target authenticated user, will take actions on the target site acting as the target user.

  5. U-067:WebSVN Input Validation Flaw in getLog() Permits Cross-Site Scripting Attacks

    Broader source: Energy.gov [DOE]

    A remote user can access the target user's cookies (including authentication cookies), if any, associated with the site running the WebSVN software, access data recently submitted by the target user via web form to the site, or take actions on the site acting as the target user.

  6. Prediction of failure behavior of a welded pressure vessel containing flaws during a hydrogen-charged burst test

    SciTech Connect (OSTI)

    Bhuyan, G.S.; Sperling, E.J.; Shen, G.; Yin, H.; Rana, M.D.

    1996-12-01

    An industry-government collaborative program was carried out with an aim to promoting the acceptance of fracture mechanics based fitness-for-service assessment methodology for a service-damaged pressure vessel. A collaborative round robin exercise was carried out to predict the fracture behavior of a vessel containing hydrogen damage, fabrication related lack-of-fusion defects, an artificially induced fatigue crack and a localized thinned area. The fracture assessment procedures used include the US ASME Material Property Council`s PREFIS Program based on the British Standard (BS) Published Document (PD) 6493, ASME Section XI and The Central Electricity Generating Board (CEGB) R6 approach; The welding Institute (TWI) CRACKWISE program (based on BS PD6493 Level 2 approach), a variant of the R6 approach, J-tearing instability approaches, various J-estimation schemes, LEFM approach and simplified stress analysis. Assessments were compared with the results obtained from a hydrogen charged burst test of the vessel. Predictions, based on the J-tearing approach, compared well with the actual burst test results. Actual burst pressure was about five times the operating pressure.

  7. Prediction of failure behavior of a welded pressure vessel containing flaws during a hydrogen-charged burst test

    SciTech Connect (OSTI)

    Bhuyan, G.S.; Sperling, E.J.; Shen, G.; Yin, H.; Rana, M.D.

    1999-08-01

    An industry-government collaborative program was carried out with an aim to promoting the acceptance of fracture mechanics-based fitness-for-service assessment methodology for a service-damaged pressure vessel. A collaborative round robin exercise was carried out to predict the fracture behavior of a vessel containing hydrogen damage, fabrication-related lack-of-fusion defects, an artificially induced fatigue crack, and a localized thinned area. The fracture assessment procedures used include the US ASME Material Property Council`s PREFIS Program based on the British Standard (BS) Published Document (PD) 6493, ASME Section XI and The Central Electricity Generating Board (CEGB) R6 approach, The Welding Institute (TWI) CRACKWISE program (based on BS PD6493 Level 2 approach), a variant of the R6 approach, J-tearing instability approaches, various J-estimation schemes, LEFM approach, and simplified stress analysis. Assessments were compared with the results obtained from a hydrogen-charged burst test of the vessel. Predictions, based on the J-tearing approach, compared well with the actual burst test results. Actual burst pressure was about five times the operating pressure.

  8. Aerial Photography (Nannini, 1986) | Open Energy Information

    Open Energy Info (EERE)

    to: navigation, search GEOTHERMAL ENERGYGeothermal Home Exploration Activity: Aerial Photography (Nannini, 1986) Exploration Activity Details Location Unspecified Exploration...

  9. Modeling-Computer Simulations (Combs, Et Al., 1999) | Open Energy...

    Open Energy Info (EERE)

    navigation, search GEOTHERMAL ENERGYGeothermal Home Exploration Activity: Modeling-Computer Simulations (Combs, Et Al., 1999) Exploration Activity Details Location Unspecified...

  10. Modeling-Computer Simulations (Ozkocak, 1985) | Open Energy Informatio...

    Open Energy Info (EERE)

    navigation, search GEOTHERMAL ENERGYGeothermal Home Exploration Activity: Modeling-Computer Simulations (Ozkocak, 1985) Exploration Activity Details Location Unspecified...

  11. Field Mapping (Healy, 1970) | Open Energy Information

    Open Energy Info (EERE)

    to: navigation, search GEOTHERMAL ENERGYGeothermal Home Exploration Activity: Field Mapping (Healy, 1970) Exploration Activity Details Location Unspecified Exploration Technique...

  12. Magnetotellurics (Muse, 1973) | Open Energy Information

    Open Energy Info (EERE)

    (Muse, 1973) Jump to: navigation, search GEOTHERMAL ENERGYGeothermal Home Exploration Activity: Magnetotellurics (Muse, 1973) Exploration Activity Details Location Unspecified...

  13. Water Sampling (Healy, 1970) | Open Energy Information

    Open Energy Info (EERE)

    Jump to: navigation, search GEOTHERMAL ENERGYGeothermal Home Exploration Activity: Water Sampling (Healy, 1970) Exploration Activity Details Location Unspecified Exploration...

  14. Geothermal Literature Review (Wisian, Et Al., 2001) | Open Energy...

    Open Energy Info (EERE)

    navigation, search GEOTHERMAL ENERGYGeothermal Home Exploration Activity: Geothermal Literature Review (Wisian, Et Al., 2001) Exploration Activity Details Location Unspecified...

  15. Geothermal Literature Review (Majer, 2003) | Open Energy Information

    Open Energy Info (EERE)

    navigation, search GEOTHERMAL ENERGYGeothermal Home Exploration Activity: Geothermal Literature Review (Majer, 2003) Exploration Activity Details Location Unspecified Exploration...

  16. Geothermal Literature Review (Laney, 2005) | Open Energy Information

    Open Energy Info (EERE)

    navigation, search GEOTHERMAL ENERGYGeothermal Home Exploration Activity: Geothermal Literature Review (Laney, 2005) Exploration Activity Details Location Unspecified Exploration...

  17. Geothermal Literature Review (Mcnitt, 1978) | Open Energy Information

    Open Energy Info (EERE)

    navigation, search GEOTHERMAL ENERGYGeothermal Home Exploration Activity: Geothermal Literature Review (Mcnitt, 1978) Exploration Activity Details Location Unspecified Exploration...

  18. Geographic Information System (Nash, Et Al., 2002) | Open Energy...

    Open Energy Info (EERE)

    search GEOTHERMAL ENERGYGeothermal Home Exploration Activity: Geographic Information System (Nash, Et Al., 2002) Exploration Activity Details Location Unspecified Exploration...

  19. Ground Magnetics (Nannini, 1986) | Open Energy Information

    Open Energy Info (EERE)

    to: navigation, search GEOTHERMAL ENERGYGeothermal Home Exploration Activity: Ground Magnetics (Nannini, 1986) Exploration Activity Details Location Unspecified Exploration...

  20. U-165: Apple iOS Bugs Let Remote Users Execute Arbitrary Code...

    Energy Savers [EERE]

    iOS. A remote user can cause arbitrary code to be executed on the target user's system. ... A remote user can create a specially crafted file that, when loaded by the target user, ...

  1. T-654: Apple QuickTime Multiple Bugs Let Remote Users Execute Arbitrary

    Broader source: Energy.gov [DOE]

    A remote user can create a specially crafted file that, when loaded by the target user, will execute arbitrary code on the target system. The code will run with the privileges of the target user.

  2. U-036: Apple iOS Bugs Let Remote Users Execute Arbitrary Code

    Broader source: Energy.gov [DOE]

    A remote user can create content that, when loaded by the target user, will execute arbitrary code on or obtain potentially sensitive information from the target user's system.

  3. U-153: EMC Data Protection Advisor Server and Collector Bugs Let Remote Users Deny Service

    Broader source: Energy.gov [DOE]

    Two vulnerabilities were reported in EMC Data Protection Advisor. A remote user can cause denial of service conditions.

  4. U-096: IBM AIX TCP Large Send Offload Bug Lets Remote Users Deny Service

    Broader source: Energy.gov [DOE]

    A remote user can send a series of specially crafted TCP packets to trigger a kernel panic on the target system.

  5. U-094: EMC Documentum Content Server Lets Local Administrative Users Gain Elevated Privileges

    Broader source: Energy.gov [DOE]

    EMC Documentum Content Server contains a privilege elevation vulnerability that may allow an unauthorized user to obtain highest administrative privileges on the system.

  6. T-652: Mozilla Thunderbird Bugs Let Remote Users Obtain Cookies and Execute Arbitrary Code

    Broader source: Energy.gov [DOE]

    Multiple vulnerabilities were reported in Mozilla Thunderbird. A remote user can cause arbitrary code to be executed on the target user's system. A remote user can obtain cookies from another domain in certain cases.

  7. U-055: Adobe Flash Player Bugs Let Remote Users Execute Arbitrary Code

    Broader source: Energy.gov [DOE]

    Two vulnerabilities exploited by the Intevydis vd_adobe_fp module in VulnDisco Step Ahead were reported in Adobe Flash Player.

  8. U-118: Adobe Flash Player Bugs Let Remote Users Execute Arbitrary Code and Obtain Information

    Broader source: Energy.gov [DOE]

    Two vulnerabilities were reported in Adobe Flash Player. A remote user can cause arbitrary code to be executed on the target user's system. A remote user can obtain potentially information.

  9. U-231: Cisco ASA SIP and WebVPN Bugs Let Remote Users Deny Service

    Broader source: Energy.gov [DOE]

    Two vulnerabilities were reported in Cisco ASA. A remote or remote authenticated user can cause denial of service conditions.

  10. U-210: Linux Kernel epoll_ctl() Bug Lets Local Users Deny Service

    Broader source: Energy.gov [DOE]

    A vulnerability was reported in the Linux Kernel. A local user can cause denial of service conditions.

  11. U-080: Linux Kernel XFS Heap Overflow May Let Remote Users Execute Arbitrary Code

    Broader source: Energy.gov [DOE]

    A vulnerability was reported in the Linux Kernel. A remote user can cause arbitrary code to be executed on the target user's system.

  12. T-583: Linux Kernel OSF Partition Table Buffer Overflow Lets Local Users Obtain Information

    Broader source: Energy.gov [DOE]

    A local user can create a storage device with specially crafted OSF partition tables. When the kernel automatically evaluates the partition tables, a buffer overflow may occur and data from kernel heap space may leak to user-space.

  13. T-591: VMware vmrun Utility Lets Local Users Gain Elevated Privileges

    Broader source: Energy.gov [DOE]

    The VMware vmrun utility is susceptible to a local privilege escalation in non-standard configurations.

  14. V-171: Apple Safari Bugs Let Remote Users Execute Arbitrary Code...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    specially crafted HTML that, when loaded by the target user, will trigger a memory corruption error and execute arbitrary code on the target system CVE-2013-1009,...

  15. U-222: Apple Safari Bugs Let Remote Users Execute Arbitrary Code...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    specially crafted HTML that, when loaded by the target user, will trigger a memory corruption error and execute arbitrary code on the target system CVE-2011-3016, CVE-2011-3021,...

  16. U-232: Xen p2m_teardown() Bug Lets Local Guest OS Users Deny...

    Broader source: Energy.gov (indexed) [DOE]

    unavailable and may cause the domain 0 kernel to panic. There is no requirement for memory sharing to be in use. Impact: A guest kernel can cause the host to become unresponsive...

  17. U-088: Symantec pcAnywhere Bugs Let Remote Users Execute Arbitrary Code

    Broader source: Energy.gov [DOE]

    Two vulnerabilities were reported in Symantec pcAnywhere. A remote user can execute arbitrary code on the target system. A local user can obtain elevated privileges on the target system.

  18. T-653: Linux Kernel sigqueueinfo() Process Lets Local Users Send Spoofed Signals

    Broader source: Energy.gov [DOE]

    A vulnerability was reported in the Linux Kernel. A local user can send spoofed signals to other processes in certain cases.

  19. T-538: HP OpenView Storage Data Protector Bug Lets Remote Users Execute Arbitrary Code

    Broader source: Energy.gov [DOE]

    A vulnerability was reported in HP OpenView Storage Data Protector. A remote user can execute arbitrary code on the target system.

  20. V-199: Solaris Bugs Let Local Users Gain Root Privileges, Remote...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    recommends applying July Critical Patch Update Addthis Related Articles V-181: Oracle Java SE Critical Patch Update Advisory - June 2013 V-051: Oracle Solaris Java Multiple...

  1. U-201: HP System Management Homepage Bugs Let Remote Users Deny Service

    Broader source: Energy.gov [DOE]

    The vulnerabilities could be exploited remotely resulting in unauthorized access, disclosure of information, data modification, Denial of Service (DoS), and execution of arbitrary code.

  2. V-172: ISC BIND RUNTIME_CHECK Error Lets Remote Users Deny Service Against Recursive Resolvers

    Broader source: Energy.gov [DOE]

    A defect exists which allows an attacker to crash a BIND 9 recursive resolver with a RUNTIME_CHECK error in resolver.c

  3. T-621: Citrix XenServer Lets Local Administrative Users on the Guest OS Deny Service

    Broader source: Energy.gov [DOE]

    A local administrative user on a guest operating system can interrupt the normal operation of the target hypervisor.

  4. T-647: PHP File Upload Bug May Let Remote Users Overwrite Files on the Target System

    Office of Energy Efficiency and Renewable Energy (EERE)

    PHP is prone to a security-bypass vulnerability.Successful exploits will allow an attacker to delete files from the root directory, which may aid in further attacks. PHP 5.3.6 is vulnerable; other versions may also be affected.

  5. T-579: BlackBerry Device Software Bug in WebKit Lets Remote Users...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    or instant messages. BlackBerry has described a workaround (disabling the use of JavaScript in the BlackBerry Browser) in their advisory. BlackBerry Device storage space...

  6. T-568: Mozilla Firefox Bugs Let Remote Users Conduct Cross-Site...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    execute arbitrary code. 4) An error within the internal memory mapping of non-local JavaScript variables can be exploited to cause a buffer overflow and potentially execute...

  7. U-041: Google Chrome Out-of-Bounds Write Error Lets Remote Users Execute Arbitrary Code

    Broader source: Energy.gov [DOE]

    A remote user can create HTML that, when loaded by the target user, will execute arbitrary code on the target user's system.

  8. U-026: Cisco Small Business SRP500 Series Bug Lets Remote Users Inject Commands

    Broader source: Energy.gov [DOE]

    A remote user can create a URL that, when loaded by the target authenticated administrative user, will execute arbitrary commands on the target system.

  9. U-136: Adobe Flash Player Lets Remote Users Execute Arbitrary Code

    Broader source: Energy.gov [DOE]

    Two vulnerabilities were reported in Adobe Flash Player. A remote user can cause arbitrary code to be executed on the target user's system.

  10. T-718:Adobe Acrobat/Reader Multiple Bugs Let Remote Users Execute Arbitrary Code

    Broader source: Energy.gov [DOE]

    A remote user can create a file that, when loaded by the target user, will execute arbitrary code on the target user's system.

  11. U-064: Adobe Acrobat/Reader PRC Memory Corruption Error Lets Remote Users Execute Arbitrary Code

    Broader source: Energy.gov [DOE]

    A vulnerability was reported in Adobe Acrobat/Reader, this vulnerability is being actively exploited against Windows-based systems.

  12. U-079: Adobe Acrobat/Reader Multiple Bugs Let Remote Users Execute Arbitrary Code

    Broader source: Energy.gov [DOE]

    A remote user can create a file that, when loaded by the target user, will execute arbitrary code on the target user's system.

  13. T-545: RealPlayer Heap Corruption Error in 'vidplin.dll' Lets...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    A remote user can cause arbitrary code to be executed on the target user's system. reference LINKS: Security Tracker Alert CVE-2010-4393 IMPACT ASSESSMENT: Medium Discussion: A ...

  14. T-591: VMware vmrun Utility Lets Local Users Gain Elevated Privileges...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    the target system. PLATFORM: VMware Workstation 6.5.5 and 7.1.3 and prior; VIX API for Linux 1.10.2 and prior ABSTRACT: The VMware vmrun utility is susceptible to a local...

  15. T-601: Windows Kernel win32k.sys Lets Local Users Gain Elevated Privileges

    Broader source: Energy.gov [DOE]

    Multiple vulnerabilities were reported in the Windows Kernel. A local user can obtain elevated privileges on the target system. A local user can trigger a use-after free or null pointer dereference to execute arbitrary commands on the target system with kernel level privileges.

  16. U-112: PostgreSQL Bugs Let Remote Authenticated Users Gain Elevated...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    in certain cases. reference LINKS: Vendor Advisory Security Tracker ID 1026744 CVE-2012-0866 IMPACT ASSESSMENT: Medium Discussion: For trigger functions marked SECURITY...

  17. U-244: McAfee Email Gateway Lets Remote Users Bypass Authentication...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    McAfee Security Bulletin ID: SB10026 SecurityTracker Alert ID: 1027444 Bugtraq ID: 55184 CVE-2012-4595, CVE-2012-4596, CVE-2012-4597 IMPACT ASSESSMENT: Medium Discussion A remote...

  18. U-121: Apple iOS Bugs Let Remote Users Execute Arbitrary Code...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    ID: 1026774 Apple Security Updates About the security content of iOS 5.1 Software Update CVE-2012-0641, CVE-2012-0642, CVE-2012-0643, CVE-2011-3453, CVE-2012-0644, CVE-2012-0585,...

  19. U-110: Samba Bug Lets Remote Users Execute Arbitrary Code | Department...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    code on the target system. reference LINKS: Vendor Advisory Security Tracker ID 1026739 CVE-2012-0870 IMPACT ASSESSMENT: Medium Discussion: A vulnerability was reported in Samba....

  20. T-648: Avaya IP Office Manager TFTP Server Lets Remote Users Traverse the Directory

    Broader source: Energy.gov [DOE]

    The software does not properly validate user-supplied input. A remote user can supply a specially crafted request to view files on target system running the IP Office Manager software.

  1. T-664: Apache Santuario Buffer Overflow Lets Remote Users Deny Service

    Broader source: Energy.gov [DOE]

    A buffer overflow exists when creating or verifying XML signatures with RSA keys of sizes on the order of 8192 or more bits. This typically results in a crash and denial of service in applications that verify signatures using keys that could be supplied by an attacker.

  2. U-168: EMC Documentum Information Rights Management Server Bugs Let Remote Authenticated Users Deny Service

    Broader source: Energy.gov [DOE]

    Two vulnerabilities were reported in EMC Documentum Information Rights Management Server. A remote authenticated user can cause denial of service conditions.

  3. U-159: Red Hat Enterprise MRG Messaging Qpid Bug Lets Certain Remote Users Bypass Authentication

    Broader source: Energy.gov [DOE]

    A vulnerability was reported in Red Hat Enterprise MRG Messaging. A remote user can access cluster messages and view the internal configuration.

  4. U-068:Linux Kernel SG_IO ioctl Bug Lets Local Users Gain Elevated Privileges

    Broader source: Energy.gov [DOE]

    Vulnerability was reported in FreeBSD Telnet. A remote user can execute arbitrary code on the target system.

  5. U-184: Mozilla Firefox Multiple Bugs Let Remote Users Execute Arbitrary Code

    Broader source: Energy.gov [DOE]

    A remote user can cause arbitrary code to be executed on the target user's system. A remote user can conduct cross-site scripting attacks. A remote user can obtain potentially sensitive information.

  6. V-210: HP LaserJet Pro Printer Bug Lets Remote Users Access Data

    Broader source: Energy.gov [DOE]

    A potential security vulnerability has been identified with certain HP LaserJet Pro printers. The vulnerability could be exploited remotely to gain unauthorized access to data.

  7. T-571: Linux Kernel dns_resolver Key Processing Error Lets Local Users Deny Services

    Broader source: Energy.gov [DOE]

    A vulnerability was reported in the Linux Kernel. A local user can cause denial of service conditions.

  8. T-719:Apache mod_proxy_ajp HTTP Processing Error Lets Remote Users Deny Service

    Broader source: Energy.gov [DOE]

    A remote user can cause the backend server to remain in an error state until the retry timeout expires.

  9. U-236: Microsoft JScript and VBScript Engine Integer Overflow Lets Remote Users Execute Arbitrary Code

    Broader source: Energy.gov [DOE]

    Execution of arbitrary code via network A remote user can cause arbitrary code to be executed on the target

  10. Turn Down the Temp, But Don't Let Your Pipes Freeze! | Department of Energy

    Broader source: Energy.gov (indexed) [DOE]

    Energy John Schueler John Schueler Former New Media Specialist, Office of Public Affairs Later today Secretary Chu will be answering your questions as a part of the White House's Tuesday Talk series. The discussion will be broadcast live starting at 1:15 EST and will build off of the Secretary's speech at the National Press Club yesterday, which called on the United States to sharply accelerate innovations in clean energy. You can submit your questions for consideration via the White House's

  11. T-692: VMware vFabric tc Server Lets Remote Users Login Using...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    A remote user can login using an obfuscated version of their password. PLATFORM: ... user can use the password in obfuscated form (or in plain text form) to authenticate. ...

  12. U-130: JBoss Operations Network LDAP Authentication Bug Lets Remote Users Bypass Authentication

    Office of Energy Efficiency and Renewable Energy (EERE)

    A vulnerability was reported in JBoss Operations Network. A remote user can login with an arbitrary password in certain cases.

  13. T-635: Cisco AnyConnect Secure Mobility Client Lets Remote Users...

    Energy Savers [EERE]

    ... An attacker could create a malicious web page that looks like the normal VPN web login ... This arbitrary executable would be executed with the same operating system privileges ...

  14. U-233: Oracle Database INDEXTYPE CTXSYS.CONTEXT Bug Lets Remote Authenticated Users Gain Elevated Privileges

    Office of Energy Efficiency and Renewable Energy (EERE)

    A remote authenticated user with 'Create Table' privileges can gain 'SYS' privileges on the target system.

  15. Let us count the ways. We've built programs that reflect

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    We develop computational tools, algorithms and strategies to analyze, understand, create, design and build complex engineered, natural or human systems. Contact Mark Bryden,...

  16. T-573: Windows Remote Desktop Client DLL Loading Error Lets Remote Users Execute Arbitrary Code

    Broader source: Energy.gov [DOE]

    A vulnerability was reported in Windows Remote Desktop Client. A remote user can cause arbitrary code to be executed on the target user's system.

  17. U-045: Windows Win32k.sys Keyboard Layout Bug Lets Local Users...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    ID: SA46919 IMPACT ASSESSMENT: Low Discussion: A vulnerability has been discovered in Microsoft Windows, which can be exploited by malicious, local users to cause a DoS (Denial...

  18. Letting the Sun Shine on Solar Costs: An Empirical Investigation of Photovoltaic Cost Trends in California

    SciTech Connect (OSTI)

    Wiser, R.; Bolinger, M.; Cappers, P.; Margolis, R.

    2006-01-01

    This report provides a comprehensive analysis of grid-connected solar photovoltaic (PV) cost trends in California, which is by far the largest PV market in the United States. The findings of this work may help stakeholders to understand important trends in the California PV market, and policymakers to design more effective solar incentive programs--a particularly important objective given the recent announcement from the California Public Utilities Commission (CPUC) to establish an 11-year, $3.2 billion incentive program for customer-sited solar. The study statistically analyzes the installed cost of grid-connected PV systems funded by the state's two largest solar rebate programs, overseen by the California Energy Commission (CEC) [operating since 1998] and the CPUC [operating since 2001].

  19. U-208: HP Operations Agent Bugs Let Remote Users Execute Arbitrary Code

    Broader source: Energy.gov [DOE]

    Two vulnerabilities were reported in HP Operations Agent. A remote user can execute arbitrary code on the target system

  20. U-192: VMware Workstation/Player VM Remote Device Bug Lets Local...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    aBSTRACT: A local or remote user can cause denial of service conditions on the target virtual system. reference LINKS: Vendor Advisory Security Tracker ID 1027173 CVE-2012-3289...

  1. BLM and NEPA: Lets`s get back to the future

    SciTech Connect (OSTI)

    Meridith, D.P.

    1995-12-01

    This talk is a personalized account of the relationship between The National Environmental Policy Act (NEPA) and the Bureau of Land Management (BLM) and the challenges the BLM faces in the future.

  2. T-608: HP Virtual Server Environment Lets Remote Authenticated Users Gain Elevated Privileges

    Broader source: Energy.gov [DOE]

    A potential security vulnerability has been identified in HP Virtual Server Environment for Windows. The vulnerability could be exploited remotely to elevate privileges.

  3. U-017: HP MFP Digital Sending Software Lets Local Users Obtain Potentially Sensitive Information

    Broader source: Energy.gov [DOE]

    A vulnerability was reported in HP MFP Digital Sending Software. A local user can obtain potentially sensitive information.

  4. Let's Keep Talking: Women in STEM Tweet Up | Department of Energy

    Office of Environmental Management (EM)

    file photo Gloria B. Smith Deputy Director, Office of Diversity & Inclusion We recently held a Tweet Up about women in science, technology, engineering, and mathematics (STEM). ...

  5. T-602: BlackBerry Enterprise Server Input Validation Flaw in BlackBerry Web Desktop Manager Permits Cross-Site Scripting Attacks

    Broader source: Energy.gov [DOE]

    The BlackBerry Web Desktop Manager not properly filter HTML code from user-supplied input before displaying the input. A remote user can cause arbitrary scripting code to be executed by the target user's browser. The code will originate from the site running the BlackBerry Web Desktop Manager software and will run in the security context of that site. As a result, the code will be able to access the target user's cookies (including authentication cookies), if any, associated with the site, access data recently submitted by the target user via web form to the site, or take actions on the site acting as the target user.

  6. T-615: IBM Rational System Architect ActiveBar ActiveX Control Lets Remote Users Execute Arbitrary Code

    Broader source: Energy.gov [DOE]

    There is a high risk security vulnerability with the ActiveBar ActiveX controls used by IBM Rational System Architect.

  7. U-165: Apple iOS Bugs Let Remote Users Execute Arbitrary Code and Spoof Address Bar URLs

    Broader source: Energy.gov [DOE]

    Two vulnerabilities were reported in Apple iOS. A remote user can cause arbitrary code to be executed on the target user's system. A remote user can spoof the address bar URL.

  8. T-568: Mozilla Firefox Bugs Let Remote Users Conduct Cross-Site Request Forgery Attacks and Execute Arbitrary Code

    Broader source: Energy.gov [DOE]

    Mozilla developers identified and fixed several memory safety bugs in the browser engine used in Firefox and other Mozilla-based products. Some of these bugs showed evidence of memory corruption under certain circumstances, and Mozilla presume that with enough effort at least some of these could be exploited to run arbitrary code.

  9. T-567: Linux Kernel Buffer Overflow in ldm_frag_add() May Let Local Users Gain Elevated Privileges

    Broader source: Energy.gov [DOE]

    A vulnerability was reported in the Linux Kernel. A local user may be able to obtain elevated privileges on the target system. A physically local user can connect a storage device with a specially crafted LDM partition table to trigger a buffer overflow in the ldm_frag_add() function in 'fs/partitions/ldm.c' and potentially execute arbitrary code with elevated privileges.

  10. U-177: Lotus Quickr for Domino ActiveX Control Buffer Overflow Lets Remote Users Execute Arbitrary Code

    Broader source: Energy.gov [DOE]

    A vulnerability was reported in Lotus Quickr for Domino. A remote user can cause arbitrary code to be executed on the target user's system.

  11. T-633: BIND RRSIG RRsets Negative Caching Off-by-one Bug Lets Remote Users Deny Service

    Broader source: Energy.gov [DOE]

    A remote DNS server can supply very large RRSIG RRsets in a negative response to trigger an off-by-one error in a buffer size check and cause the target requesting named process to crash. A remote user can cause named to crash.

  12. U-232: Xen p2m_teardown() Bug Lets Local Guest OS Users Deny Service on the Host OS

    Broader source: Energy.gov [DOE]

    A vulnerability was reported in Xen. A local user on a guest operating system can cause denial of service conditions on the host.

  13. U-012: BlackBerry Enterprise Server Collaboration Service Bug Lets Remote Users Impersonate Intra-organization Messages

    Office of Energy Efficiency and Renewable Energy (EERE)

    A vulnerability was reported in BlackBerry Enterprise Server. A remote user can impersonate another messaging user within the same organization.

  14. U-155: WebCalendar Access Control and File Inclusion Bugs Let Remote Users Potentially Execute Arbitrary Code

    Office of Energy Efficiency and Renewable Energy (EERE)

    Two vulnerabilities were reported in WebCalendar. A remote user may be able to execute arbitrary PHP code on the target system.

  15. U-211: EMC Celerra/VNX/VNXe Access Control Bug Lets Remote Authenticated Users Access Files/Directories

    Office of Energy Efficiency and Renewable Energy (EERE)

    A vulnerability was reported in EMC Celerra/VNX/VNXe. A remote authenticated user can access files and directories on the target file system.

  16. T-609: Adobe Acrobat/Reader Memory Corruption Error in CoolType Library Lets Remote Users Execute Arbitrary Code

    Broader source: Energy.gov [DOE]

    A remote user can create a specially crafted PDF file that, when loaded by the target user, will trigger a memory corruption error in the CoolType library and execute arbitrary code on the target system. The code will run with the privileges of the target user.

  17. U-063: RSA SecurID Software Token for Windows DLL Loading Error Lets Remote Users Execute Arbitrary Code

    Broader source: Energy.gov [DOE]

    A remote user can cause the target application to execute arbitrary code on the target user's system.

  18. From ZZ to ZH : How Low Can These Cross Sections Go or Everybody, Let's Cross Section Limbo!

    SciTech Connect (OSTI)

    Strauss, Emanuel Alexandre; /SUNY, Stony Brook

    2009-08-01

    We report on two searches performed at the D0 detector at the Fermi National Laboratory. The first is a search for Z di-boson production with a theoretical cross section of 1.4 pb. The search was performed on 2.6 fb{sup -1} of data and contributed to the first observation of ZZ production at a hadron collider. The second is a search for a low mass Standard Model Higgs in 4.2 fb{sup -1} of data. The Higgs boson is produced in association with a Z boson where the Higgs decays hadronically and the Z decays to two leptons. The ZZ search was performed in both the di-electron and di-muon channels. For the ZH search, we will focus on the muonic decays where we expanded the traditional coverage by considering events in which one of the two muons fails the selection requirement, and is instead reconstructed as an isolated track. We consider Higgs masses between 100 and 150 GeV, with theoretical cross sections ranging from 0.17 to 0.042 pb, and set upper limits on the ZH production cross-section at 95% confidence level.

  19. T-563: Red Hat Directory Server Bugs Let Local Users Gain Elevated Privileges and Remote and Local Users Deny Service

    Broader source: Energy.gov [DOE]

    Several vulnerabilities were reported in Red Hat Directory Server. A local user can obtain elevated privileges on the target system. A remote user can cause denial of service conditions. A local user can cause denial of service conditions.

  20. U-217: Red Hat Certificate System Bugs Let Remote Users Conduct Cross-Site Scripting and Denial of Service Attacks

    Office of Energy Efficiency and Renewable Energy (EERE)

    Two vulnerabilities were reported in Red Hat Certificate System. A remote user can conduct cross-site scripting attacks. A remote authenticated user can revoke the CA certificate.

  1. U-008: Symantec Data Loss Prevention Bugs in KeyView Filter Lets Remote Users Deny Service

    Broader source: Energy.gov [DOE]

    A remote user can create a file that, when processed by the target filter, will cause partial denial of service conditions.

  2. V-117: Symantec Enterprise Vault for File System Archiving Unquoted Search Path Lets Local Users Gain Elevated Privileges

    Broader source: Energy.gov [DOE]

    Symantec Enterprise Vault (EV) for File System Archiving has an unquoted search path in the File Collector and File PlaceHolder services

  3. U-264: Apple OS X Lets Remote Users Execute Arbitrary Code and Local Users Gain Elevated Privileges

    Office of Energy Efficiency and Renewable Energy (EERE)

    Several vulnerabilities were reported in Apple OS X. A remote user can execute arbitrary code on the target system. A remote user can obtain a password hash in certain cases. A local user can obtain elevated privileges on the target system. A local user can obtain password keystrokes.

  4. U-074: Microsoft.NET Bugs Let Remote Users Execute Arbitrary Commands, Access User Accounts, and Redirect Users

    Broader source: Energy.gov [DOE]

    A remote user can execute arbitrary commands on the target system. A remote user can access a target user's account. A remote user can redirect users to arbitrary sites.

  5. U-112: PostgreSQL Bugs Let Remote Authenticated Users Gain Elevated Privileges, Inject SQL Commands, and Spoof Certificates

    Broader source: Energy.gov [DOE]

    A remote authenticated user can gain elevated privileges. A remote authenticated user can inject SQL commands. A remote user can spoof connections in certain cases.

  6. U-163: PHP Command Parameter Bug Lets Remote Users Obtain Potentially Sensitive Information and Execute Arbitrary Code

    Broader source: Energy.gov [DOE]

    A vulnerability was reported in PHP. A remote user can obtain potentially sensitive information. A remote user can execute arbitrary code on the target system.

  7. U-128: VMware ESX/ESXi Buffer Overflow and Null Pointer Dereference Lets Local Users Gain Elevated Privileges

    Broader source: Energy.gov [DOE]

    A vulnerability was reported in VMware ESX. A local user can obtain elevated privileges on the target system.

  8. InSAR | Open Energy Information

    Open Energy Info (EERE)

    2007) Unspecified Advances In Geothermal Resource Exploration Circa 2007 InSAR At Brady Hot Springs Area (Laney, 2005) Brady Hot Springs Area Federal Geothermal Research...

  9. The original of this document contains information which is subject...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    ... in October 2014, and agreed with the diagnosis of Unspecified Neurocognitive Disorder, ... Id. at 47-48. His diagnosis for the individual was Learning Disorder, Not Otherwise ...

  10. Thermochronometry (Monaster And Coolbaugh, 2007) | Open Energy...

    Open Energy Info (EERE)

    Location Unspecified Exploration Technique Thermochronometry Activity Date Usefulness useful DOE-funding Unknown References Francis C. Monastero, Mark F. Coolbaugh (2007) Advances...

  11. InSAR (Monaster And Coolbaugh, 2007) | Open Energy Information

    Open Energy Info (EERE)

    Details Location Unspecified Exploration Technique InSAR Activity Date Usefulness useful DOE-funding Unknown References Francis C. Monastero, Mark F. Coolbaugh (2007) Advances...

  12. Multispectral Imaging (Monaster And Coolbaugh, 2007) | Open Energy...

    Open Energy Info (EERE)

    Unspecified Exploration Technique Multispectral Imaging Activity Date Usefulness useful DOE-funding Unknown References Francis C. Monastero, Mark F. Coolbaugh (2007) Advances...

  13. BPA-2013-01583-FOIA Response

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Headquarters Misuse of Resources Misuse or C The Caller reported unspecified time card fraud New 50 Misappropriation of Assets or Information 09172012 BPA-12-09-0006 Raver...

  14. Presentation title: This can be up to 2 lines

    Annual Energy Outlook [U.S. Energy Information Administration (EIA)]

    Outline * RFS Advanced Biofuels Standard * Data on Brazil ethanol imports and ... 4 2011 2012 2013 2014 Advanced Biofuel Standard As Legislated Unspecified Advanced ...

  15. BrightView Systems Ltd | Open Energy Information

    Open Energy Info (EERE)

    Ltd Jump to: navigation, search Name: BrightView Systems Ltd Place: Petach-Tikva, Israel Zip: 49510 Product: Has developed an unspecified technology for PV cell manufacture....

  16. V-197: Adobe ColdFusion 10 WebSockets Security Bypass Vulnerability

    Office of Energy Efficiency and Renewable Energy (EERE)

    The vulnerability is caused due to an unspecified error and can be exploited to invoke public methods on ColdFusion Components (CFC) using WebSockets

  17. Some Aspects Of Exploration In Non-Volcanic Areas | Open Energy...

    Open Energy Info (EERE)

    Aeromagnetic Survey (Nannini, 1986) Ground Gravity Survey (Nannini, 1986) Ground Magnetics (Nannini, 1986) Reflection Survey (Nannini, 1986) Areas (1) Unspecified Regions (0)...

  18. V-192: Symantec Security Information Manager Input Validation...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Flaws Permit Cross-Site Scripting, SQL Injection, and Information Disclosure Attacks V-192: Symantec Security Information Manager Input Validation Flaws Permit Cross-Site...

  19. Sandia Energy Infrastructure Assurance

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Wind-Turbine Blade Flaw Detection Experiments in Denmark http:energy.sandia.govsandia-wind-turbine-blade-flaw-detection-experiments-in-denmark http:energy.sandia.gov...

  20. Brittle Failure Design Criteria for Ductile Cast Iron Spent-Fuel

    Office of Scientific and Technical Information (OSTI)

    ... . 8 4.1 DropTest . . . . . . . . . . . . . . . . 8 4.2 Test Conditions . . . . . . . . . . . . . . 8 4.3 Location of Test Flaws . . . . . . . . . . . . 8 4.4 Flaw Configuration . ...

  1. Predicting fracture in micron-scale polycrystalline silicon MEMS...

    Office of Scientific and Technical Information (OSTI)

    The measured tensile strength distributions enable the definition of a threshold strength as well as an inferred maximum flaw size. The nature of strength-controlling flaws has ...

  2. T-723:Adobe Flash Player Multiple Bugs Let Remote Users Obtain Information, Conduct Cross-Site Scripting Attacks, and Execute Arbitrary Code

    Broader source: Energy.gov [DOE]

    An attacker can exploit this issue by enticing an unsuspecting victim into visiting a malicious website.

  3. 'Let the phage do the work': Using the phage P22 coat protein structures as a framework to understand its folding and assembly mutants

    SciTech Connect (OSTI)

    Teschke, Carolyn M., E-mail: Teschke@uconn.ed [Departments of Molecular and Cell Biology, and Chemistry, 91 N. Eagleville Rd., U-3125, University of Connecticut, Storrs, CT 06269-3125 (United States); Parent, Kristin N. [Department of Chemistry and Biochemistry, University of California, San Diego, La Jolla, CA (United States)

    2010-06-05

    The amino acid sequence of viral capsid proteins contains information about their folding, structure and self-assembly processes. While some viruses assemble from small preformed oligomers of coat proteins, other viruses such as phage P22 and herpesvirus assemble from monomeric proteins (Fuller and King, 1980). The subunit assembly process is strictly controlled through protein:protein interactions such that icosahedral structures are formed with specific symmetries, rather than aberrant structures. dsDNA viruses commonly assemble by first forming a precursor capsid that serves as a DNA packaging machine. DNA packaging is accompanied by a conformational transition of the small precursor procapsid into a larger capsid for isometric viruses. Here we highlight the pseudo-atomic structures of phage P22 coat protein and rationalize several decades of data about P22 coat protein folding, assembly and maturation generated from a combination of genetics and biochemistry.

  4. U-081: McAfee SaaS 'myCIOScn.dll' ActiveX Control Lets Remote Users Execute Arbitrary Code

    Broader source: Energy.gov [DOE]

    A remote user can create HTML that, when loaded by the target user, will execute arbitrary code on the target user's system.

  5. T-660: OpenSSH on FreeBSD Has Buffer Overflow in pam_thread() That Lets Remote Users Execute Arbitrary Code

    Broader source: Energy.gov [DOE]

    The module does not adequately validate user input leading to an cross-site scripting (XSS) possibility in certain circumstances.

  6. T-635: Cisco AnyConnect Secure Mobility Client Lets Remote Users Execute Arbitrary Code and Local Users Gain Elevated Privileges

    Broader source: Energy.gov [DOE]

    Cisco AnyConnect Secure Mobility Client contains a vulnerability that could allow an unauthenticated, remote attacker to execute arbitrary code on a targeted system. The vulnerability exists due to improper validation of program executables downloaded by the Cisco AnyConnect Secure Mobility Client. An unauthenticated, remote attacker could exploit the vulnerability by convincing the targeted user to view a malicious website. If successful, the attacker could execute arbitrary code on the system with the privileges of the user. Cisco confirmed the vulnerability in a security advisory and released software updates.

  7. V-183: Cisco TelePresence TC and TE Bugs Let Remote Users Deny Service and Remote Adjacent Authenticated Users Gain Root Shell Access

    Broader source: Energy.gov [DOE]

    Cisco TelePresence TC and TE Software contain two vulnerabilities in the implementation of the Session Initiation Protocol (SIP) that could allow an unauthenticated remote attacker to cause a denial of service (DoS) condition. Additionally, Cisco TelePresence TC Software contain an adjacent root access vulnerability that could allow an attacker on the same physical or logical Layer-2 network as the affected system to gain an unauthenticated root shell.

  8. Health effects models for nuclear power plant accident consequence analysis: Low LET radiation: Part 2, Scientific bases for health effects models

    SciTech Connect (OSTI)

    Abrahamson, S.; Bender, M.; Book, S.; Buncher, C.; Denniston, C.; Gilbert, E.; Hahn, F.; Hertzberg, V.; Maxon, H.; Scott, B.

    1989-05-01

    This report provides dose-response models intended to be used in estimating the radiological health effects of nuclear power plant accidents. Models of early and continuing effects, cancers and thyroid nodules, and genetic effects are provided. Two-parameter Weibull hazard functions are recommended for estimating the risks of early and continuing health effects. Three potentially lethal early effects -- the hematopoietic, pulmonary and gastrointestinal syndromes -- are considered. Linear and linear-quadratic models are recommended for estimating cancer risks. Parameters are given for analyzing the risks of seven types of cancer in adults -- leukemia, bone, lung, breast, gastrointestinal, thyroid and ''other''. The category, ''other'' cancers, is intended to reflect the combined risks of multiple myeloma, lymphoma, and cancers of the bladder, kidney, brain, ovary, uterus and cervix. Models of childhood cancers due to in utero exposure are also provided. For most cancers, both incidence and mortality are addressed. Linear and linear-quadratic models are also recommended for assessing genetic risks. Five classes of genetic disease -- dominant, x-linked, aneuploidy, unbalanced translocation and multifactorial diseases --are considered. In addition, the impact of radiation-induced genetic damage on the incidence of peri-implantation embryo losses is discussed. The uncertainty in modeling radiological health risks is addressed by providing central, upper, and lower estimates of all model parameters. Data are provided which should enable analysts to consider the timing and severity of each type of health risk. 22 refs., 14 figs., 51 tabs.

  9. EERE Communications

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    ... v. 75 dry ton, PNNL v NREL, resp.), but very different in ash content (0.9% v. 5.93%), moisture content (10% v. 25%), and particle size (2-6mm v. pellets of un-specified size). ...

  10. Quarterly Progress Report Template

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    ... Sandia used ANSI 316L stainless steel, garnet media with 60-120 mesh, and an unspecified model of Binks paint gun. Surface of samples were prepared and chemical cleaning steps were ...

  11. JC3 | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    11, 2013 V-197: Adobe ColdFusion 10 WebSockets Security Bypass Vulnerability The vulnerability is caused due to an unspecified error and can be exploited to invoke public methods...

  12. JC3 Bulletin Archive | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    11, 2013 V-197: Adobe ColdFusion 10 WebSockets Security Bypass Vulnerability The vulnerability is caused due to an unspecified error and can be exploited to invoke public methods...

  13. Useful Graphs and Charts - Ion Beams - Radiation Effects Facility...

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Times 15 MeVu LET vs Range Graph 25 MeVu LET vs Range Graph 40 Mevu LET vs Range Graph Radiation Effects Facility Cyclotron Institute Texas A&M University MS 3366 ...

  14. T-610: Red Hat kdenetwork security update

    Office of Energy Efficiency and Renewable Energy (EERE)

    A directory traversal flaw was found in the way KGet, a download manager, handled the "file" element in Metalink files.

  15. FEAB210 | netl.doe.gov

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Pipeline Flaw Detection Using Shear EMAT and Wavelet Analysis FEAB210 Goal: The goal of this project is to develop an Electromagnetic Acoustic Transducer (EMAT) sensor, capable of detecting physical flaws in the wall of a 30-inch natural gas pipeline. These physical flaws include: stress corrosion cracking (SCC), circumferential and axial flaws, and corrosion. In addition, work will be conducted to design, fabricate, test, and integrate the EMAT sensor with an autonomous robotic platform,

  16. V-117: Symantec Enterprise Vault for File System Archiving Unquoted...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    for File System Archiving Unquoted Search Path Lets Local Users Gain Elevated Privileges V-117: Symantec Enterprise Vault for File System Archiving Unquoted Search Path Lets Local...

  17. V-177: VMware vCenter Chargeback Manager File Upload Handling...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Apache modproxymodrewrite Bug Lets Remote Users Access Internal Servers U-047: Siemens Automation License Manager Bugs Let Remote Users Deny Service or Execute Arbitrary Code...

  18. SAND2005-2638

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    ... PASD has demonstrated great potential to locate aircraft wiring flaws relevant to aging ... launch a low voltage pulse down a transmission line and monitor the same injection ...

  19. Sandia Energy - Wind-Turbine Blade Materials and Reliability...

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    the technology to be evaluated in terms of its probability of detection (POD). Different types and sizes of flaws were embedded into substructure components representing...

  20. T-559: Stack-based buffer overflow in oninit in IBM Informix...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    exploit this vulnerability. The specific flaw exists within the oninit process bound to TCP port 9088 when processing the arguments to the USELASTCOMMITTED option in a SQL query....

  1. T-701: Citrix Access Gateway Enterprise Edition Input Validation...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    1: Citrix Access Gateway Enterprise Edition Input Validation Flaw in Logon Portal Permits Cross-Site Scripting Attacks T-701: Citrix Access Gateway Enterprise Edition Input...

  2. Beyond the Lone-Pair Model for Structurally Distorted Metal Oxides

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    The results have important implications for the tantalizing possibility of spintronic or superconducting devices combining ferroelectric and ferromagnetic properties. Flawed but ...

  3. Sandia Energy Monitoring

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    rspace-warning-area-established-to-aid-research-explorationfeed 0 Sandia Wind-Turbine Blade Flaw Detection Experiments in Denmark http:energy.sandia.govsandia-wind-turbine-bla...

  4. DOE - Office of Legacy Management -- University of Michigan ...

    Office of Legacy Management (LM)

    with a supersonic reflectroscope to detect flaws within a metal slug and developed methods for testing the adequacy of coatings which are applied to pieces of uranium metal....

  5. 1.TIF

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    ... extracts plutonlum-for nuclear bombs, is being modi- find to accept and extract plutonium from commercial spent fuel. ... Se entirely du. to the DOE'S totally flawed Panels.. ...

  6. Low frequency acoustic microscope

    DOE Patents [OSTI]

    Khuri-Yakub, Butrus T.

    1986-11-04

    A scanning acoustic microscope is disclosed for the detection and location of near surface flaws, inclusions or voids in a solid sample material. A focused beam of acoustic energy is directed at the sample with its focal plane at the subsurface flaw, inclusion or void location. The sample is scanned with the beam. Detected acoustic energy specularly reflected and mode converted at the surface of the sample and acoustic energy reflected by subsurface flaws, inclusions or voids at the focal plane are used for generating an interference signal which is processed and forms a signal indicative of the subsurface flaws, inclusions or voids.

  7. On the approximation of crack shapes found during inservice inspection

    SciTech Connect (OSTI)

    Bhate, S.R.; Chawla, D.S.; Kushwaha, H.S.

    1997-04-01

    This paper addresses the characterization of axial internal flaw found during inservice inspection of a pipe. J-integral distribution for various flaw shapes is obtained using line spring finite, element method. The peak J-value and its distribution across the crack is found to be characteristic feature of each shape. The triangular shape yields peak J-value away from the center, the point of depth. The elliptic approximation results in large overestimate of J-value for unsymmetric flaws. Triangular approximation is recommended for such flaws so that further service can be obtained from the component.

  8. MESSAGE: WIA W/O CLOSING REF CLOSING REF

    Office of Legacy Management (LM)

    ... from the early years of the nation's atomic energy program or from commercial ... Betatron Building to detect metallurgical flaws. X-ray services were provided by General ...

  9. V-213: PuTTY SSH Handshake Integer Overflow Vulnerabilities ...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    source code repository Addthis Related Articles V-222: SUSE update for Filezilla V-157: Adobe Reader Acrobat Multiple Vulnerabilities V-066: Adobe AcrobatReader Multiple Flaws...

  10. T-632: Google Chrome OS before R12 0.12.433.38 Beta Update

    Broader source: Energy.gov [DOE]

    CVE-2011-2171 addresses unspecified vulnerabilities in the dbugs package of Google Chrome OS. Prior versions of Google Chrome can be fixed by updating to the current release. Information and content related to this CVE was last updated on 05/25/2011. To find out more information about Chromium OS Security and Reported Bugs, please visit: The Chromium Projects Security Overview.

  11. T-611: Cisco IOS OCSP Revoked Certificate Security Issue

    Broader source: Energy.gov [DOE]

    The PKI functionality in Cisco IOS 15.0 and 15.1 does not prevent permanent caching of certain public keys, which allows remote attackers to bypass authentication and have unspecified other impact by leveraging an IKE peer relationship in which a key was previously valid but later revoked, aka Bug ID CSCth82164, a different vulnerability than CVE-2010-4685.

  12. V-134: Cisco AnyConnect Secure Mobility Client Heap Overflow...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    4: Cisco AnyConnect Secure Mobility Client Heap Overflow Lets Local Users Gain Elevated Privileges V-134: Cisco AnyConnect Secure Mobility Client Heap Overflow Lets Local Users ...

  13. V-228: RealPlayer Buffer Overflow and Memory Corruption Error...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    V-228: RealPlayer Buffer Overflow and Memory Corruption Error Let Remote Users Execute ... Lets Remote Users Execute Arbitrary Code V-049: RealPlayer Buffer Overflow and Invalid ...

  14. QER- Comment of Xcel Energy

    Office of Energy Efficiency and Renewable Energy (EERE)

    Attached are the comments of Xcel Energy Services Inc. Please let me know if you have any questions.

  15. Microsoft PowerPoint - Final 2015 Annual Report presentation...

    Office of Legacy Management (LM)

    ... Adjusted timer settings Monitored power levels SPPTS * Contract let for ... analysis Wells around former Solar Evaporation Ponds Surface water ...

  16. V-026: RSA Data Protection Manager Bugs Permit Cross-Site Scripting Attacks

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    and Let Local Users Bypass Security Restrictions | Department of Energy 26: RSA Data Protection Manager Bugs Permit Cross-Site Scripting Attacks and Let Local Users Bypass Security Restrictions V-026: RSA Data Protection Manager Bugs Permit Cross-Site Scripting Attacks and Let Local Users Bypass Security Restrictions November 16, 2012 - 6:00am Addthis PROBLEM: RSA Data Protection Manager Bugs Permit Cross-Site Scripting Attacks and Let Local Users Bypass Security Restrictions. PLATFORM: RSA

  17. Emissivity corrected infrared method for imaging anomalous structural heat flows

    DOE Patents [OSTI]

    Del Grande, Nancy K.; Durbin, Philip F.; Dolan, Kenneth W.; Perkins, Dwight E.

    1995-01-01

    A method for detecting flaws in structures using dual band infrared radiation. Heat is applied to the structure being evaluated. The structure is scanned for two different wavelengths and data obtained in the form of images. Images are used to remove clutter to form a corrected image. The existence and nature of a flaw is determined by investigating a variety of features.

  18. Risk assessment of turbine rotor failure using probabilistic ultrasonic non-destructive evaluations

    SciTech Connect (OSTI)

    Guan, Xuefei; Zhang, Jingdan; Zhou, S. Kevin; Rasselkorde, El Mahjoub; Abbasi, Waheed A.

    2014-02-18

    The study presents a method and application of risk assessment methodology for turbine rotor fatigue failure using probabilistic ultrasonic nondestructive evaluations. A rigorous probabilistic modeling for ultrasonic flaw sizing is developed by incorporating the model-assisted probability of detection, and the probability density function (PDF) of the actual flaw size is derived. Two general scenarios, namely the ultrasonic inspection with an identified flaw indication and the ultrasonic inspection without flaw indication, are considered in the derivation. To perform estimations for fatigue reliability and remaining useful life, uncertainties from ultrasonic flaw sizing and fatigue model parameters are systematically included and quantified. The model parameter PDF is estimated using Bayesian parameter estimation and actual fatigue testing data. The overall method is demonstrated using a realistic application of steam turbine rotor, and the risk analysis under given safety criteria is provided to support maintenance planning.

  19. Defect occurrence, detection, location and characterization; essential variables of the LBB concept application to primary piping

    SciTech Connect (OSTI)

    Crutzen, S.; Koble, T.D.; Lemaitre, P.

    1997-04-01

    Applications of the Leak Before Break (LBB) concept involve the knowledge of flaw presence and characteristics. In Service Inspection is given the responsibility of detecting flaws of a determined importance to locate them precisely and to classify them in broad families. Often LBB concepts application imply the knowledge of flaw characteristics such as through wall depth; length at the inner diameter (ID) or outer diameter (OD) surface; orientation or tilt and skew angles; branching; surface roughness; opening or width; crack tip aspect. Besides detection and characterization, LBB evaluations consider important the fact that a crack could be in the weld material or in the base material or in the heat affected zone. Cracks in tee junctions, in homogenous simple welds and in elbows are not considered in the same way. Essential variables of a flaw or defect are illustrated, and examples of flaws found in primary piping as reported by plant operators or service vendors are given. If such flaw variables are important in the applications of LBB concepts, essential is then the knowledge of the performance achievable by NDE techniques, during an ISI, in detecting such flaws, in locating them and in correctly evaluating their characteristics.

  20. Summary of Decisions - March 21, 2016 - March 25, 2016 | Department of

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Energy 21, 2016 - March 25, 2016 Summary of Decisions - March 21, 2016 - March 25, 2016 March 25, 2016 - 8:17am Addthis Personnel Security (10 CFR Part 710) On March 23, 2016, an OHA Administrative Judge issued a decision in which he concluded that an individual's security clearance should not be restored. A DOE consulting psychiatrist evaluated the individual and concluded that he met the DSM 5 criteria for Unspecified Neurocognitive Disorder on the basis of observed impairments in memory

  1. PSH-15-0078 - In the Matter of Personnel Security Hearing | Department of

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Energy 8 - In the Matter of Personnel Security Hearing PSH-15-0078 - In the Matter of Personnel Security Hearing On March 23, 2016, an OHA Administrative Judge issued a decision in which he concluded that an individual's security clearance should not be restored. A DOE consulting psychiatrist evaluated the individual and concluded that he met the DSM 5 criteria for Unspecified Neurocognitive Disorder on the basis of observed impairments in memory and attention and variable performance on

  2. Code System to Calculate Pressure Vessel Failure Probabilities.

    Energy Science and Technology Software Center (OSTI)

    2001-03-27

    Version 00 OCTAVIA (Operationally Caused Transients And Vessel Integrity Analysis) calculates the probability of pressure vessel failure from operationally-caused pressure transients which can occur in a pressurized water reactor (PWR). For specified vessel and operating environment characteristics the program computes the failure pressure at which the vessel will fail for different-sized flaws existing in the beltline and the probability of vessel failure per reactor year due to the flaw. The probabilities are summed over themore » various flaw sizes to obtain the total vessel failure probability. Sensitivity studies can be performed to investigate different vessel or operating characteristics in the same computer run.« less

  3. Observations on Characterization of Defects in Coiled Tubing From Magnetic-Flux-Leakage Data

    SciTech Connect (OSTI)

    Timothy R. McJunkin; Karen S. Miller; Charles R. Tolle

    2006-04-01

    This paper presents observations on the sizing of automatically detected artificial flaws in coiled tubing samples using magnetic-flux-leakage data. Sixty-six artificial flaws of various shapes and types, ranging from 0.30 mm deep pits to slots with length of 9.5 mm, in 44.45 mm outer diameter pipe were analyzed. The detection algorithm and the information automatically extracted from the data are described. Observations on the capabilities and limitations for determining the size and shape of the flaws are discussed.

  4. PARALLELS OF RADIATION- AND FINANCIAL-RISK MANAGEMENT ON PUBLIC ACCEPTANCE

    SciTech Connect (OSTI)

    Hogue, M.

    2010-01-04

    The financial collapse of 2007 provides an opportunity for a cross-discipline comparison of risk assessments. Flaws in financial risk assessments bear part of the blame for the financial collapse. There may be a potential for similar flaws to be made in radiological risk assessments. Risk assessments in finance and health physics are discussed in the context of a broader view of the risk management environment. Flawed risk assessments can adversely influence public acceptance of radiological technologies, so the importance of quality is magnified.

  5. RangeTables.xls

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    (MeVcm²/mg) LET vs. Range in Si for 25 MeV SEE Beams (low LET) 4 He 14 N 0 0.5 1 1.5 0 600 1200 1800 2400 3000 3600 4 He 14 N 22 Ne 0 1 2 3 4 5 6 7 8 9 10 0 100 200 300 400 500 600 700 800 900 1000 1100 LET (MeVcm²/mg) Range in Silicon (µm) LET vs. Range in Si for 25 MeV SEE Beams (low LET) After aramica window and 30 mm of air 4 He 14 N 0 0.5 1 1.5 0 600 1200 1800 2400 3000 3600 Range in Silicon (µm) 129 Xe 30 40 50 60 (MeVcm²/mg) LET vs. Range in Si for 25 MeV SEE Beams After aramica

  6. Getting It Right: Accurate Testing and Assessments Critical to Deploying the Next Generation of Auto Fuels

    Office of Energy Efficiency and Renewable Energy (EERE)

    Today, the Coordinating Research Council released a report on the effects of E15 and E20 on vehicle engines. We, at the Energy Department, believe the study is significantly flawed.

  7. Ultrasonic examination of the heavy section test blocks for hydroprocessing reactors used by the petroleum industry

    SciTech Connect (OSTI)

    Dodd, F.J.; Zhang, Y.; Imgram, A.

    1995-12-01

    An 18-inch (457 mm) thick Cr-Mo steel test block with an austenitic stainless steel ID cladding was designed and fabricated at the direction of the Material Properties Council in cooperation with the Pressure Vessel Research Committee (PVRC) Committee on Nondestructive Examination of Components. The test block contains several embedded flaws located near both ID and OD surfaces. Chevron Research and Technology Company and WesDyne International conducted the initial UT Examinations on this block at Chevron. In addition, a 10-inch (254 mm) thick block with embedded flaws was also examined. All the flaws m the two blocks were either cracks or lack of fusion. The examination results demonstrate the feasibility of UT to detect and size flaws in hydroprocessing reactor vessels and provide a basis to compare the relative capabilities of UT with the radiographic (RT) inspections currently required by the fabrication code.

  8. Getting It Right: Accurate Testing and Assessments Critical to...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    called the Coordinating Research Council (CRC), released a report on the effects of E15 ... We believe the study is significantly flawed. The CRC failed to establish a proper control ...

  9. SNL Researchers Assess Wind Turbine Blade Inspection and Repair...

    Broader source: Energy.gov (indexed) [DOE]

    A picture of several wind turbine blade panels set out on a table and held in place with metal clamps. Flaws in wind turbine blades emanating from the manufacturing process are an ...

  10. Photo Gallery

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Such flaws can act as small initiation sites for damage that could grow during subsequent high-fluence (high laser energy per unit area) laser shots, potentially limiting NIF's ...

  11. Image Analysis of Turbine Blades Using CT Scans| GE Global Research

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    turbine blades in a jet or gas engine. If large enough, they can have significant impact on performance, durability, and safety of the engine. Detecting these flaws before turbine ...

  12. Aligned composite structures for mitigation of impact damage and resistance to wear in dynamic environments

    DOE Patents [OSTI]

    Mulligan, Anthony C.; Rigali, Mark J.; Sutaria, Manish P.; Popovich, Dragan; Halloran, Joseph P.; Fulcher, Michael L.; Cook, Randy C.

    2005-12-13

    Fibrous monolith composites having architectures that provide increased flaw insensitivity, improved hardness, wear resistance and damage tolerance and methods of manufacture thereof are provided for use in dynamic environments to mitigate impact damage and increase wear resistance.

  13. Aligned composite structures for mitigation of impact damage and resistance to wear in dynamic environments

    DOE Patents [OSTI]

    Rigali, Mark J.; Sutaria, Manish P.; Mulligan, Anthony C.; Popovich, Dragan

    2004-03-23

    Fibrous monolith composites having architectures that provide increased flaw insensitivity, improved hardness, wear resistance and damage tolerance and methods of manufacture thereof are provided for use in dynamic environments to mitigate impact damage and increase wear resistance.

  14. Aligned composite structures for mitigation of impact damage and resistance to wear in dynamic environments

    DOE Patents [OSTI]

    Mulligan, Anthony C.; Rigali, Mark J.; Sutaria, Manish P.; Popovich, Dragan; Halloran, Joseph P.; Fulcher, Michael L.; Cook, Randy C.

    2009-04-14

    Fibrous monolith composites having architectures that provide increased flaw insensitivity, improved hardness, wear resistance and damage tolerance and methods of manufacture thereof are provided for use in dynamic environments to mitigate impact damage and increase wear resistance.

  15. BPA-2015-01296-FOIA Response

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    It is from the Aprill4, 2015letter from DW Gregoire of Energy Northwest to the NRC with subject: COLUMBIA GENERATING STATION, DOCKET NO. 50-397 DEVIATION FROM BWRVIP FLAW...

  16. T-626: Xen Multiple Buffer Overflow and Integer Overflow Vulnerabilities

    Broader source: Energy.gov [DOE]

    It was found that the xc_try_bzip2_decode() and xc_try_lzma_decode() decode routines did not correctly check for a possible buffer size overflow in the decoding loop. As well, several integer overflow flaws and missing error/range checking were found that could lead to an infinite loop. A privileged guest user could use these flaws to crash the guest or, possibly, execute arbitrary code in the privileged management domain (Dom0). (CVE-2011-1583)

  17. U.S. DEPARTMENT OF ENERGY * SAVANNAH RIVER SITE * AIKEN * SC

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    SoundAnchor(tm) Nondestructive Testing Method The SoundAnchor(tm) method uses ultrasonic energy for volumetric assessment of subterranean tower anchor rods without unearthing the individual rods or destabilizing the structure. Flaws in anchor rods can degrade their performance and cause catastrophic collapse of towers. Such flaws can be difficult to detect and normally occur below ground. Only a small portion of the anchor rod is exposed with the remaining portion buried in the earth. The far

  18. Nondestructive ultrasonic testing of materials

    DOE Patents [OSTI]

    Hildebrand, Bernard P.

    1994-01-01

    Reflection wave forms obtained from aged and unaged material samples can be compared in order to indicate trends toward age-related flaws. Statistical comparison of a large number of data points from such wave forms can indicate changes in the microstructure of the material due to aging. The process is useful for predicting when flaws may occur in structural elements of high risk structures such as nuclear power plants, airplanes, and bridges.

  19. Nondestructive ultrasonic testing of materials

    DOE Patents [OSTI]

    Hildebrand, B.P.

    1994-08-02

    Reflection wave forms obtained from aged and unaged material samples can be compared in order to indicate trends toward age-related flaws. Statistical comparison of a large number of data points from such wave forms can indicate changes in the microstructure of the material due to aging. The process is useful for predicting when flaws may occur in structural elements of high risk structures such as nuclear power plants, airplanes, and bridges. 4 figs.

  20. Emissivity corrected infrared method for imaging anomalous structural heat flows

    DOE Patents [OSTI]

    Del Grande, N.K.; Durbin, P.F.; Dolan, K.W.; Perkins, D.E.

    1995-08-22

    A method for detecting flaws in structures using dual band infrared radiation is disclosed. Heat is applied to the structure being evaluated. The structure is scanned for two different wavelengths and data obtained in the form of images. Images are used to remove clutter to form a corrected image. The existence and nature of a flaw is determined by investigating a variety of features. 1 fig.

  1. Reactor Pressure Vessel Fracture Analysis Capabilities in Grizzly

    SciTech Connect (OSTI)

    Spencer, Benjamin; Backman, Marie; Chakraborty, Pritam; Hoffman, William

    2015-03-01

    Efforts have been underway to develop fracture mechanics capabilities in the Grizzly code to enable it to be used to perform deterministic fracture assessments of degraded reactor pressure vessels (RPVs). Development in prior years has resulted a capability to calculate -integrals. For this application, these are used to calculate stress intensity factors for cracks to be used in deterministic linear elastic fracture mechanics (LEFM) assessments of fracture in degraded RPVs. The -integral can only be used to evaluate stress intensity factors for axis-aligned flaws because it can only be used to obtain the stress intensity factor for pure Mode I loading. Off-axis flaws will be subjected to mixed-mode loading. For this reason, work has continued to expand the set of fracture mechanics capabilities to permit it to evaluate off-axis flaws. This report documents the following work to enhance Grizzly’s engineering fracture mechanics capabilities for RPVs: • Interaction Integral and -stress: To obtain mixed-mode stress intensity factors, a capability to evaluate interaction integrals for 2D or 3D flaws has been developed. A -stress evaluation capability has been developed to evaluate the constraint at crack tips in 2D or 3D. Initial verification testing of these capabilities is documented here. • Benchmarking for axis-aligned flaws: Grizzly’s capabilities to evaluate stress intensity factors for axis-aligned flaws have been benchmarked against calculations for the same conditions in FAVOR. • Off-axis flaw demonstration: The newly-developed interaction integral capabilities are demon- strated in an application to calculate the mixed-mode stress intensity factors for off-axis flaws. • Other code enhancements: Other enhancements to the thermomechanics capabilities that relate to the solution of the engineering RPV fracture problem are documented here.

  2. Modeling Solar Energy Technology Evolution breakout session

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    ... Let us better understand why people choose NOT to invest in solar. The biggest dynamic ... Are scientific innovations required to enable the relevant functionality? * In energy ...

  3. V-123: VMware ESX / ESXi libxml2 Buffer Underflow Vulnerability...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    (2044373) Addthis Related Articles U-128: VMware ESXESXi Buffer Overflow and Null Pointer Dereference Lets Local Users Gain Elevated Privileges T-552: Cisco Nexus 1000V...

  4. U.S. Department of Energy Interim E-QIP Procedures | Department...

    Broader source: Energy.gov (indexed) [DOE]

    Energy Security Symposium OE Releases Second Issue of Energy Emergency Preparedness Quarterly (April 2012) V-147: IBM Lotus Notes Mail Client Lets Remote Users Execute Java Applets...

  5. "Title","Creator/Author","Publication Date","OSTI Identifier...

    Office of Scientific and Technical Information (OSTI)

    Genome Wide Evaluation of Normal Human Tissue in Response to Controlled, In vivo Low-Dose Low LET Ionizing Radiation Exposure: Pathways and Mechanisms Final Report, September...

  6. Genome Wide Evaluation of Normal Human Tissue in Response to...

    Office of Scientific and Technical Information (OSTI)

    Wide Evaluation of Normal Human Tissue in Response to Controlled, In vivo Low-Dose Low LET Ionizing Radiation Exposure: Pathways and Mechanisms Final Report, September 2013 Rocke,...

  7. How to Apply

    Broader source: Energy.gov [DOE]

    Awards are made through a formal process that has changed dramatically since 2011. So let us walk you through it step by step.

  8. SAND2012-2218P

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    ... renewable energy sources, grid-scale energy storage, distributed generation and demand response applications that let consumers adjust energy use based on changing energy ...

  9. EPA Launches 2014 National Building Competition

    Broader source: Energy.gov [DOE]

    Let the battle begin! The U.S. Environmental Protection Agency (EPA) in mid-July launched the 2014 National Building Competition.

  10. QER- Comment of National Rural Electric Cooperative Association 4

    Broader source: Energy.gov [DOE]

    NRECA is submitting additional comments to supplement the one previously filed on October 3rd. Please let me know if you have any questions.

  11. Science Careers in Search of Women | Argonne National Laboratory

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    now, and let us make our dreams tomorrow's reality." -Malala Yousafzai, 2014 Nobel Peace Prize Laurate Argonne Education, in conjunction with Women in Science and Technology,...

  12. U-267: RSA Authentication Agent 7.1 for Microsoft Windows...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    RSA Authentication Agent Lets Remote Authenticated Users Bypass an Authentication Step reference LINKS: SecurityTracker Alert ID: 1027559 Bugtraq ID: 55662 CVE-2012-2287...

  13. Microsoft PowerPoint - SRNL-L2100-2015-00033-S_Klein

    Office of Environmental Management (EM)

    Focus Group (TFG) Meeting Princeton Plasma Physics Laboratory (PPPL), Princeton, NJ ... Let's focus funding on plasma science and materials development." * EXIT Signs - Glass ...

  14. Energy Efficiency Post-2011 Review Scoping Document and Process...

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    workgroups, please let BPA know in your submitted comments. I. Overview and Timeline The "Energy Efficiency Post-2011 Review" (Review) is a public process to review and consider...

  15. Voluntary Initiative: Designing Incentives Toolkit | Department...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    More Documents & Publications Spotlight on Austin, Texas: Let Your Contractor Be Your Guide for Big Rewards Spotlight on Austin, Texas: Best Offer Ever Produces 564 Upgrades in ...

  16. Better Buildings: Workforce: Spotlight on Fayette County, Pennsylvania...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    What's Working in Residential Energy Efficiency Upgrade Programs - Promising Approaches and Lessons Learned Workforce and Economic Development Spotlight on Austin, Texas: Let Your ...

  17. Microsoft Word - CNMSUG-Meeting_09-25-08_minutes_v2.doc

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    to let CNMS management know what improvements would be most helpful User proposal process improvements: CNMS is moving toward a joint, online, fully electronic submission...

  18. Testimony by

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    ... Halting Yucca Mountain is Wrong Decision First, let me say that the individuals and groups I represent in South Carolina and Georgia continue to believe that the Administration's ...

  19. Fermilab F

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    please let us know. Sincerely, Michael Witherell Attachment cc: K. Stanfield H. Montgomery S. Holmes J. Appel Excerpt from April 2004 PAC Recommendations P-938 MINERA...

  20. Microsoft PowerPoint - PD_Mitlyng

    Office of Environmental Management (EM)

    offered on high-interest topics such as hurricane preparedness, seismic studies and Fukushima lessons learned * All Chats were archived Let's Chat: 9 8 * Very resource-intensive - ...

  1. Adjudicative Guidelines for Determining Eligibility for Access...

    Office of Environmental Management (EM)

    ... organizational efficiency and effectiveness, such as letting another person use one's password or computer when no other timely alternative was readily available; (c) the conduct ...

  2. Apartment Hunting with an Eye to Energy Savings: Part I

    Broader source: Energy.gov [DOE]

    Apartment hunting can be a long and stressful process. Finding that right place is difficult, let alone finding the right place with the right price.

  3. JC3 | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    have been reported in Puppet Puppet Multiple Vulnerabilities March 13, 2013 V-110: Adobe Flash Player Bugs Let Remote Users Execute Arbitrary Code Several vulnerabilities were...

  4. JC3 Bulletin Archive | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    have been reported in Puppet Puppet Multiple Vulnerabilities March 13, 2013 V-110: Adobe Flash Player Bugs Let Remote Users Execute Arbitrary Code Several vulnerabilities were...

  5. Be a Safe and Efficient Winter Driver

    Broader source: Energy.gov [DOE]

    We've been advising you on ways to make the home more energy smart, so let's talk about your car for a moment.

  6. Gloria B. Smith | Department of Energy

    Broader source: Energy.gov (indexed) [DOE]

    Gloria B. Smith - Deputy Director, Office of Diversity & Inclusion Most Recent Let's Keep Talking: Women in STEM Tweet Up April 11 Join the Conversation - Get on STEM on ...

  7. Ultrasonic Evaluation of Two Dissimilar Metal Weld Overlay Specimens

    SciTech Connect (OSTI)

    Crawford, Susan L.; Cinson, Anthony D.; Prowant, Matthew S.; Moran, Traci L.; Anderson, Michael T.

    2012-06-30

    Two dissimilar metal weld (DMW) pipe-to-nozzle specimens were implanted with thermal fatigue cracks in the 13% to 90% through-wall depth range. The specimens were ultrasonically evaluated with phased-array probes having center frequencies of 0.8, 1.0, 1.5, and 2.0 megahertz (MHz). An Alloy 82/182 weld overlay (WOL) was applied and the specimens were ultrasonically re-evaluated for flaw detection and characterization. The Post-WOL flaw depths were approximately 10% to 56% through-wall. This study has shown the effectiveness of ultrasonic examinations of Alloy 82/182 overlaid DMW specimens. Phased-array probes with center frequency in the 0.8- to 1.0-MHz range provide a strong coherent signal but the greater ultrasonic wavelength and larger beam spot size prevent the reliable detection of small flaws. These small flaws had nominal through-wall depths of less than 15% and length in the 50-60 mm (2-2.4 in.) range. Flaws in the 19% and greater through-wall depth range were readily detected with all four probes. At the higher frequencies, the reflected signals are less coherent but still provide adequate signal for flaw detection and characterization. A single inspection at 2.0 MHz could provide adequate detection and sizing information but a supplemental inspection at 1.0 or 1.5 MHz is recommended.

  8. Reactor pressure vessel structural integrity research

    SciTech Connect (OSTI)

    Pennell, W.E.; Corwin, W.R.

    1995-04-01

    Development continues on the technology used to assess the safety of irradiation-embrittled nuclear reactor pressure vessels (RPVs) containing flaws. Fracture mechanics tests on RPV steel, coupled with detailed elastic-plastic finite-element analyses of the crack-tip stress fields, have shown that (1) constraint relaxation at the crack tip of shallows surface flaws results in increased data scatter but no increase in the lower-bound fracture toughness, (2) the nil ductility temperature (NDT) performs better than the reference temperature for nil ductility transition (RT{sub NDT}) as a normalizing parameter for shallow-flaw fracture toughness data, (3) biaxial loading can reduce the shallow-flaw fracture toughness, (4) stress-based dual-parameter fracture toughness correlations cannot predict the effect of biaxial loading on a shallow-flaw fracture toughness because in-plane stresses at the crack tip are not influenced by biaxial loading, and (5) an implicit strain-based dual-parameter fracture toughness correlation can predict the effect of biaxial loading on shallow-flaw fracture toughness. Experimental irradiation investigations have shown that (1) the irradiation-induced shift in Charpy V-notch vs temperature behavior may not be adequate to conservatively assess fracture toughness shifts due to embrittlement, and (2) the wide global variations of initial chemistry and fracture properties of a nominally uniform material within a pressure vessel may confound accurate integrity assessments that require baseline properties.

  9. Initial Probabilistic Evaluation of Reactor Pressure Vessel Fracture with Grizzly and Raven

    SciTech Connect (OSTI)

    Spencer, Benjamin; Hoffman, William; Sen, Sonat; Rabiti, Cristian; Dickson, Terry; Bass, Richard

    2015-10-01

    The Grizzly code is being developed with the goal of creating a general tool that can be applied to study a variety of degradation mechanisms in nuclear power plant components. The first application of Grizzly has been to study fracture in embrittled reactor pressure vessels (RPVs). Grizzly can be used to model the thermal/mechanical response of an RPV under transient conditions that would be observed in a pressurized thermal shock (PTS) scenario. The global response of the vessel provides boundary conditions for local models of the material in the vicinity of a flaw. Fracture domain integrals are computed to obtain stress intensity factors, which can in turn be used to assess whether a fracture would initiate at a pre-existing flaw. These capabilities have been demonstrated previously. A typical RPV is likely to contain a large population of pre-existing flaws introduced during the manufacturing process. This flaw population is characterized stastistically through probability density functions of the flaw distributions. The use of probabilistic techniques is necessary to assess the likelihood of crack initiation during a transient event. This report documents initial work to perform probabilistic analysis of RPV fracture during a PTS event using a combination of the RAVEN risk analysis code and Grizzly. This work is limited in scope, considering only a single flaw with deterministic geometry, but with uncertainty introduced in the parameters that influence fracture toughness. These results are benchmarked against equivalent models run in the FAVOR code. When fully developed, the RAVEN/Grizzly methodology for modeling probabilistic fracture in RPVs will provide a general capability that can be used to consider a wider variety of vessel and flaw conditions that are difficult to consider with current tools. In addition, this will provide access to advanced probabilistic techniques provided by RAVEN, including adaptive sampling and parallelism, which can dramatically

  10. Phased Array Ultrasonic Examination of Reactor Coolant System (Carbon Steel-to-CASS) Dissimilar Metal Weld Mockup Specimen

    SciTech Connect (OSTI)

    Crawford, S. L.; Cinson, A. D.; Diaz, A. A.; Anderson, M. T.

    2015-11-23

    In the summer of 2009, Pacific Northwest National Laboratory (PNNL) staff traveled to the Electric Power Research Institute (EPRI) NDE Center in Charlotte, North Carolina, to conduct phased-array ultrasonic testing on a large bore, reactor coolant pump nozzle-to-safe-end mockup. This mockup was fabricated by FlawTech, Inc. and the configuration originated from the Port St. Lucie nuclear power plant. These plants are Combustion Engineering-designed reactors. This mockup consists of a carbon steel elbow with stainless steel cladding joined to a cast austenitic stainless steel (CASS) safe-end with a dissimilar metal weld and is owned by Florida Power & Light. The objective of this study, and the data acquisition exercise held at the EPRI NDE Center, were focused on evaluating the capabilities of advanced, low-frequency phased-array ultrasonic testing (PA-UT) examination techniques for detection and characterization of implanted circumferential flaws and machined reflectors in a thick-section CASS dissimilar metal weld component. This work was limited to PA-UT assessments using 500 kHz and 800 kHz probes on circumferential flaws only, and evaluated detection and characterization of these flaws and machined reflectors from the CASS safe-end side only. All data were obtained using spatially encoded, manual scanning techniques. The effects of such factors as line-scan versus raster-scan examination approaches were evaluated, and PA-UT detection and characterization performance as a function of inspection frequency/wavelength, were also assessed. A comparative assessment of the data is provided, using length-sizing root-mean-square-error and position/localization results (flaw start/stop information) as the key criteria for flaw characterization performance. In addition, flaw signal-to-noise ratio was identified as the key criteria for detection performance.

  11. ORNL Evaluation of Electrabel Safety Cases for Doel 3 / Tihange 2: Final Report

    SciTech Connect (OSTI)

    Bass, Bennett Richard; Dickson, Terry L.; Gorti, Sarma B.; Klasky, Hilda B.; Nanstad, Randy K.; Sokolov, Mikhail A.; Williams, Paul T.; Server, W. L.

    2015-11-01

    Oak Ridge National Laboratory (ORNL) performed a detailed technical review of the 2015 Electrabel (EBL) Safety Cases prepared for the Belgium reactor pressure vessels (RPVs) at Doel 3 and Tihange 2 (D3/T2). The Federal Agency for Nuclear Control (FANC) in Belgium commissioned ORNL to provide a thorough assessment of the existing safety margins against cracking of the RPVs due to the presence of almost laminar flaws found in each RPV. Initial efforts focused on surveying relevant literature that provided necessary background knowledge on the issues related to the quasilaminar flaws observed in D3/T2 reactors. Next, ORNL proceeded to develop an independent quantitative assessment of the entire flaw population in the two Belgian reactors according to the American Society of Mechanical Engineers (ASME) Boiler and Pressure Vessel Code, Section XI, Appendix G, Fracture Toughness Criteria for Protection Against Failure, New York (1992 and 2004). That screening assessment of all EBL-characterized flaws in D3/T2 used ORNL tools, methodologies, and the ASME Code Case N-848, Alternative Characterization Rules for QuasiLaminar Flaws . Results and conclusions from the ORNL flaw acceptance assessments of D3/T2 were compared with those from the 2015 EBL Safety Cases. Specific findings of the ORNL evaluation of that part of the EBL structural integrity assessment focusing on stability of the flaw population subjected to primary design transients include the following: ORNL s analysis results were similar to those of EBL in that very few characterized flaws were found not compliant with the ASME (1992) acceptance criterion. ORNL s application of the more recent ASME Section XI (2004) produced only four noncompliant flaws, all due to LOCAs. The finding of a greater number of non-compliant flaws in the EBL screening assessment is due principally to a significantly more restrictive (conservative) criterion for flaw size acceptance used by EBL. ORNL s screening assessment results

  12. Controlled quantum-state transfer in a spin chain

    SciTech Connect (OSTI)

    Gong, Jiangbin [Department of Physics and Center for Computational Science and Engineering, National University of Singapore, 117542 (Singapore); Brumer, Paul [Chemical Physics Theory Group and Center for Quantum Information and Quantum Control, University of Toronto, Toronto M5S 3H6 (Canada)

    2007-03-15

    Control of the transfer of quantum information encoded in quantum wave packets moving along a spin chain is demonstrated. Specifically, based on a relationship with control in a paradigm of quantum chaos, it is shown that wave packets with slow dispersion can automatically emerge from a class of initial superposition states involving only a few spins, and that arbitrary unspecified traveling wave packets can be nondestructively stopped and later relaunched with perfection. The results establish an interesting application of quantum chaos studies in quantum information science.

  13. Processing ultrasonic inspection data from multiple scan patterns for turbine rotor weld build-up evaluations

    SciTech Connect (OSTI)

    Guan, Xuefei; Zhou, S. Kevin; Rasselkorde, El Mahjoub; Abbasi, Waheed

    2015-03-31

    The study presents a data processing methodology for weld build-up using multiple scan patterns. To achieve an overall high probability of detection for flaws with different orientations, an inspection procedure with three different scan patterns is proposed. The three scan patterns are radial-tangential longitude wave pattern, axial-radial longitude wave pattern, and tangential shear wave pattern. Scientific fusion of the inspection data is implemented using volume reconstruction techniques. The idea is to perform spatial domain forward data mapping for all sampling points. A conservative scheme is employed to handle the case that multiple sampling points are mapped to one grid location. The scheme assigns the maximum value for the grid location to retain the largest equivalent reflector size for the location. The methodology is demonstrated and validated using a realistic ring of weld build-up. Tungsten balls and bars are embedded to the weld build-up during manufacturing process to represent natural flaws. Flat bottomed holes and side drilled holes are installed as artificial flaws. Automatic flaw identification and extraction are demonstrated. Results indicate the inspection procedure with multiple scan patterns can identify all the artificial and natural flaws.

  14. Using Phased Array Ultrasonic Testing in Lieu of Radiography for Acceptance of Carbon Steel Piping Welds

    SciTech Connect (OSTI)

    Moran, Traci L.; Anderson, Michael T.; Cinson, Anthony D.; Crawford, Susan L.; Nove, Carol A.

    2014-08-01

    The Pacific Northwest National Laboratory (PNNL) is conducting studies for the U.S. Nuclear Regulatory Commission (NRC) to assess the capability, effectiveness, and reliability of ultrasonic testing (UT) as a replacement method for radiographic testing (RT) for volumetric examination of nuclear power plant (NPP) components. This particular study focused on evaluating the use of UT on carbon steel plate welds. Welding fabrication flaws included a combination of planar and volumetric types, e.g., incomplete fusion, lack of penetration, cracks, porosity, and slag inclusions. The examinations were conducted using phased-array (PA) UT techniques applied primarily for detection and flaw type characterization. This paper will discuss the results of using UT in lieu of RT for detection and classification of fabrication flaws in carbon steel plate welds.

  15. Weld defect distributions in offshore structures and their influence on structural reliability

    SciTech Connect (OSTI)

    Rogerson, J.H.; Wong, W.K.

    1982-01-01

    Failure by fracture is a serious possible fracture mode of steel offshore structures particularly in hostile, low-temperature environments. Such fracture usually initiates from flaws in regions of stress concentration. For any probabilistic failure analysis to be credible, it is necessary to have a good estimate of the flaw size and distribution. For fixed steel platforms the important flaw size distribution is the distribution of defect height in welds in node connections. Previous work has shown that different structures have similar defect distributions which suggests that a function can be derived for the generality of such structures. Data has been analyzed relating to > 1000 m of weld in one North Sea structure. From this can be seen that a Weibull distribution is the appropriate function to use for defect height. Conclusions also are drawn about the required reliability of even an imperfect inspection and repair technique to significantly reduce failure probability.

  16. Crack detection using resonant ultrasound spectroscopy

    DOE Patents [OSTI]

    Migliori, A.; Bell, T.M.; Rhodes, G.W.

    1994-10-04

    Method and apparatus are provided for detecting crack-like flaws in components. A plurality of exciting frequencies are generated and applied to a component in a dry condition to obtain a first ultrasonic spectrum of the component. The component is then wet with a selected liquid to penetrate any crack-like flaws in the component. The plurality of exciting frequencies are again applied to the component and a second ultrasonic spectrum of the component is obtained. The wet and dry ultrasonic spectra are then analyzed to determine the second harmonic components in each of the ultrasonic resonance spectra and the second harmonic components are compared to ascertain the presence of crack-like flaws in the component. 5 figs.

  17. Crack detection using resonant ultrasound spectroscopy

    DOE Patents [OSTI]

    Migliori, Albert; Bell, Thomas M.; Rhodes, George W.

    1994-01-01

    Method and apparatus are provided for detecting crack-like flaws in components. A plurality of exciting frequencies are generated and applied to a component in a dry condition to obtain a first ultrasonic spectrum of the component. The component is then wet with a selected liquid to penetrate any crack-like flaws in the component. The plurality of exciting frequencies are again applied to the component and a second ultrasonic spectrum of the component is obtained. The wet and dry ultrasonic spectra are then analyzed to determine the second harmonic components in each of the ultrasonic resonance spectra and the second harmonic components are compared to ascertain the presence of crack-like flaws in the component.

  18. Single crystal metal wedges for surface acoustic wave propagation

    DOE Patents [OSTI]

    Fisher, E.S.

    1980-05-09

    An ultrasonic testing device has been developed to evaluate flaws and inhomogeneities in the near-surface region of a test material. A metal single crystal wedge is used to generate high frequency Rayleigh surface waves in the test material surface by conversion of a slow velocity, bulk acoustic mode in the wedge into a Rayleigh wave at the metal-wedge test material interface. Particular classes of metals have been found to provide the bulk acoustic modes necessary for production of a surface wave with extremely high frequency and angular collimation. The high frequency allows flaws and inhomogeneities to be examined with greater resolution. The high degree of angular collimation for the outgoing ultrasonic beam permits precision angular location of flaws and inhomogeneities in the test material surface.

  19. Crack detection using resonant ultrasound spectroscopy

    SciTech Connect (OSTI)

    Migliori, A.; Bell, T.M.

    1992-12-31

    This invention is comprised of a method and apparatus for detecting crack-like flaws in components. A plurality of exciting frequencies are generated and applied to a component in a dry condition to obtain a first ultrasonic spectrum of the component. The component is then wet with a selected liquid to penetrate any crack-like flaws in the component. The plurality of exciting frequencies are again applied to the component and a second ultrasonic spectrum of the component is obtained. The wet and dry ultrasonic spectra are then analyzed to determine the second harmonic components in each of the ultrasonic resonance spectra and the second harmonic components are compared to ascertain the presence of crack-like flaws in the component.

  20. Single crystal metal wedges for surface acoustic wave propagation

    DOE Patents [OSTI]

    Fisher, Edward S.

    1982-01-01

    An ultrasonic testing device has been developed to evaluate flaws and inhomogeneities in the near-surface region of a test material. A metal single crystal wedge is used to generate high frequency Rayleigh surface waves in the test material surface by conversion of a slow velocity, bulk acoustic mode in the wedge into a Rayleigh wave at the metal-wedge test material interface. Particular classes of metals have been found to provide the bulk acoustic modes necessary for production of a surface wave with extremely high frequency and angular collimation. The high frequency allows flaws and inhomogeneities to be examined with greater resolution. The high degree of angular collimation for the outgoing ultrasonic beam permits precision angular location of flaws and inhomogeneities in the test material surface.